Zero trust security an enterprise guide

Detalles Bibliográficos
Otros Autores: Garbis, Jason , author (author), Chapman, Jerry W., author
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress [2021]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631691906719
Tabla de Contenidos:
  • Intro
  • Table of Contents
  • About the Authors
  • About the Technical Reviewer
  • Acknowledgments
  • Foreword
  • Part I: Overview
  • Chapter 1: Introduction
  • Chapter 2: What Is Zero Trust?
  • History and Evolution
  • Forrester's Zero Trust eXtended (ZTX) Model
  • Gartner's Approach to Zero Trust
  • Our Perspective on Zero Trust
  • Core Principles
  • Expanded Principles
  • A Working Definition
  • Zero Trust Platform Requirements
  • Summary
  • Chapter 3: Zero Trust Architectures
  • A Representative Enterprise Architecture
  • Identity and Access Management
  • Network Infrastructure (Firewalls, DNS, Load Balancers)
  • Jump Boxes
  • Privileged Access Management
  • Network Access Control
  • Intrusion Detection/Intrusion Prevention
  • Virtual Private Network
  • Next-Generation Firewalls
  • Security Information and Event Management
  • Web Server and Web Application Firewall
  • Infrastructure as a Service
  • Software as a Service and Cloud Access Security Brokers
  • A Zero Trust Architecture
  • The NIST Zero Trust Model
  • A Conceptual Zero Trust Architecture
  • Policy Components
  • Types of Policy Enforcement Points
  • What Is a Policy Enforcement Point?
  • Zero Trust Deployment Models
  • Resource-Based Deployment Model
  • Enclave-Based Deployment Model
  • Cloud-Routed Deployment Model
  • Microsegmentation Deployment Model
  • Summary
  • Chapter 4: Zero Trust in Practice
  • Google's BeyondCorp
  • PagerDuty's Zero Trust Network
  • The Software-Defined Perimeter and Zero Trust
  • Mutual TLS Communications
  • Single-Packet Authorization
  • SDP Case Study
  • Zero Trust and Your Enterprise
  • Summary
  • Part II: Zero Trust and Enterprise Architecture Components
  • Chapter 5: Identity and Access Management
  • IAM in Review
  • Identity Stores (Directories)
  • Databases
  • LDAP
  • Identity-as-a-Service
  • Identity Lifecycle
  • Lifecycle Management.
  • Identity Governance
  • Access Management
  • Authentication
  • LDAP
  • RADIUS
  • SAML
  • OAuth2
  • OpenID Connect (OIDC)
  • Certificate-Based Authentication
  • FIDO2
  • Mobile and Biometrics
  • Authorization
  • Zero Trust and IAM
  • Authentication, Authorization, and Zero Trust Integration
  • Enhancing Legacy System Authentication
  • Zero Trust as Catalyst for Improving IAM
  • Summary
  • Chapter 6: Network Infrastructure
  • Network Firewalls
  • The Domain Name System
  • Public DNS Servers
  • Private DNS Servers
  • Monitoring DNS for Security
  • Wide Area Networks
  • Load Balancers, Application Delivery Controllers, and API Gateways
  • Web Application Firewalls
  • Summary
  • Chapter 7: Network Access Control
  • Introduction to Network Access Control
  • Zero Trust and Network Access Control
  • Unmanaged Guest Network Access
  • Managed Guest Network Access
  • Managed vs. Unmanaged Guest Networks: A Debate
  • Employee BYOD
  • Device Posture Checks
  • Device Discovery and Access Controls
  • Summary
  • Chapter 8: Intrusion Detection and Prevention Systems
  • Types of IDPS
  • Host-Based Systems
  • Network-Based Systems
  • Network Traffic Analysis and Encryption
  • Zero Trust and IDPS
  • Summary
  • Chapter 9: Virtual Private Networks
  • Enterprise VPNs and Security
  • Zero Trust and VPNs
  • Summary
  • Chapter 10: Next-Generation Firewalls
  • History and Evolution
  • Zero Trust and NGFWs
  • Network Traffic Encryption: Implications
  • Network Architectures
  • Summary
  • Chapter 11: Security Operations
  • Security Information and Event Management
  • Security Orchestration, Automation, and Response
  • Zero Trust in the Security Operations Center
  • Enriched Log Data
  • Orchestration and Automation (Triggers and Events)
  • Authentication Trigger
  • Resource Access Trigger
  • Periodic (Session Expiration) Trigger
  • External Trigger.
  • Zero Trust Querying for Additional Context (Authentication Trigger)
  • SIEM/SOAR Invoking Zero Trust System (External Trigger)
  • Indirect Integration (External Trigger)
  • Summary
  • Chapter 12: Privileged Access Management
  • Password Vaulting
  • Secrets Management
  • Privileged Session Management
  • Zero Trust and PAM
  • Summary
  • Chapter 13: Data Protection
  • Data Types and Data Classification
  • Data Lifecycle
  • Data Creation
  • Data Usage
  • Data Destruction
  • Data Security
  • Zero Trust and Data
  • Summary
  • Chapter 14: Infrastructure and Platform as a Service
  • Definitions
  • Zero Trust and Cloud Services
  • Service Meshes
  • Summary
  • Chapter 15: Software as a Service
  • SaaS and Cloud Security
  • Native SaaS Controls
  • Secure Web Gateways
  • Cloud Access Security Brokers
  • Zero Trust and SaaS
  • Zero Trust and Edge Services
  • Summary
  • Chapter 16: IoT Devices and "Things"
  • IoT Device Networking and Security Challenges
  • Zero Trust and IoT Devices
  • Summary
  • Part III: Putting It All Together
  • Chapter 17: A Zero Trust Policy Model
  • Policy Components
  • Subject Criteria
  • Action
  • Target
  • Access to Host 10.6.1.34
  • Access to Host appserver1.internal.example.com
  • Access to Hosts on the Subnet 10.5.1.0/24
  • Access to Systems Tagged as "department=Marketing"
  • Access to Systems Tagged as "stage=test"
  • Condition
  • Time of Day Is Between 08:00 and 18:00
  • User Has Performed a Valid MFA or Step-Up Authentication Within the Last 90 Minutes
  • Device Posture Meets Requirements: Anti-malware Service Is Running
  • Device Posture Meets Requirements: Endpoint Security Scan Completed Fewer Than 48 Hours Ago
  • A Service Desk Ticket Is in an Open State for This Resource
  • Both the Subject and the Target Must Be Servers Tagged as Being in a "Production" State
  • Subject Criteria vs. Conditions
  • Example Policies.
  • Policies, Applied
  • Attributes
  • Policy Scenarios
  • Target-Initiated Access
  • Microsegmentation
  • Policy Evaluation and Enforcement Flows
  • Authentication Trigger
  • Access Trigger
  • Session Expiration Trigger
  • External Trigger
  • Summary
  • Chapter 18: Zero Trust Scenarios
  • VPN Replacement/VPN Alternative
  • Considerations
  • Resources
  • Users and User Experience
  • Identity Providers
  • Networking
  • Recommendations
  • Third-Party Access
  • Considerations
  • Architecture
  • Users and User Experience
  • Recommendations
  • Cloud Migration
  • Migration Categories
  • Forklift Migration
  • Refactor the Application
  • Rewrite the Application
  • Adopt SaaS
  • Considerations
  • Architecture
  • Forklift
  • Refactor the Application
  • Rewrite the Application
  • Adopt SaaS
  • Users and User Experience
  • Recommendations
  • Service-to-Service Access
  • Considerations
  • Recommendations
  • DevOps
  • DevOps Phases
  • Plan and Code
  • Build and Test
  • Release and Deploy
  • Operate and Monitor
  • Considerations
  • Recommendations
  • Mergers and Acquisitions
  • Considerations
  • Recommendations
  • Divestiture
  • Full Zero Trust Network/Network Transformation
  • Considerations
  • Recommendations
  • Summary
  • Chapter 19: Making Zero Trust Successful
  • Zero Trust: A Strategic Approach (Top-Down)
  • Governance Board
  • Architecture Review Board
  • Change Management Board
  • Value Drivers
  • Security
  • Audit and Compliance
  • Agility/New Business Initiatives
  • Customer/Partner Integrations
  • Technology Modernization
  • Zero Trust: A Tactical Approach (Bottom-Up)
  • Sample Zero Trust Deployments
  • Scenario 1: A Tactical Zero Trust Project
  • Define Problem
  • Research Zero Trust Solutions
  • Review Approach and Proposed Architecture
  • POC Two Candidate Zero Trust Platforms
  • Present POC Results
  • Production Pilot
  • Validate Pilot Results and Value.
  • Full Production Rollout
  • Scenario 2: A Strategic Zero Trust Initiative
  • Common Roadblocks
  • Identity Management Immaturity
  • Political Resistance
  • Regulatory or Compliance Constraints
  • Discovery and Visibility of Resources
  • Analysis Paralysis
  • Summary
  • Chapter 20: Conclusion
  • Chapter 21: Afterword
  • Plan, Plan, Then Plan Some More
  • Zero Trust Is (Unfortunately) Political
  • Dream Big, Start Small
  • Show Me the Money
  • Digital Transformation Is Your Friend
  • Appendix A: Further Reading: An Annotated List
  • Industry Standards and Specifications
  • Books
  • Research Documents and Publications
  • Index.