Zero Trust Overview and Playbook Introduction Guidance for Business, Security, and Technology Leaders and Practitioners

Enhance your cybersecurity and agility with this thorough playbook, featuring actionable guidance, insights, and success criteria from industry experts Key Features Get simple, clear, and practical advice for everyone from CEOs to security operations Organize your Zero Trust journey into role-by-rol...

Descripción completa

Detalles Bibliográficos
Otros Autores: Simos, Mark, author (author), Kumar, Nikhil, author, Johnson, Ann, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing Ltd [2023]
Edición:First edition
Colección:Zero trust playbook.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009781237206719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Dedicated
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Chapter 1: Zero Trust - This Is the Way
  • Introducing Zero Trust
  • Introducing the Zero Trust Playbook Series
  • Common Zero Trust questions
  • Summary
  • Chapter 2: Reading the Zero Trust Playbook Series
  • Reading strategies
  • How we structured the playbooks
  • Zero Trust Overview and Playbook Introduction
  • Business and Technical Leadership Playbook
  • Technical Topic Playbooks
  • Futures
  • Summary
  • Chapter 3: Zero Trust Is Security for Today's World
  • Continuous change and why we need Zero Trust
  • Changes come faster in the digital age
  • Defining success in the digital age
  • Technology accelerates change and complexity
  • A darker trend - the growth of cybercrime
  • Staying balanced - assume failure and assume success
  • Cybersecurity or information security?
  • Implications and imperatives of Zero Trust
  • It's a team sport
  • Security must be agile
  • Failure is not an option
  • Dispelling confusion - frequently asked questions on Zero Trust
  • Aren't attackers just kids in their basements playing on computers?
  • Shouldn't security have solved this simple technical problem by now?
  • Who are the attackers?
  • Can't we just arrest these criminals and put them in jail?
  • Is this just a matter of spending more money?
  • If I have a Zero Trust strategy and funding, can I make this go away quickly?
  • Can we ever be completely safe? What should I do about it?
  • Is this cyberwar?
  • What are the most damaging attacks?
  • What does success look like for security and Zero Trust?
  • Why is Zero Trust so confusing?
  • How do I know if something is Zero Trust?
  • Summary
  • Chapter 4: Standard Zero Trust Capabilities
  • Consistency via a simple model and durable capabilities.
  • The Open Group Zero Trust Reference Model
  • Security disciplines
  • Digital ecosystems and business assets
  • Key Zero Trust capabilities
  • Capabilities as a common language of security
  • Zero Trust capabilities reference
  • Does Zero Trust include network security?
  • Summary
  • Chapter 5: Artificial Intelligence (AI) and Zero Trust
  • What is AI?
  • What will the impact of AI look like?
  • What are the limitations of AI?
  • AI models do not "understand" anything
  • AI models reflect any biases in their data
  • How can Zero Trust help manage AI security risk?
  • Zero Trust - the top four priorities for managing AI risk
  • How will AI impact Zero Trust?
  • Summary
  • Chapter 6: How to Scope, Size, and Start Zero Trust
  • Agile security - think big, start small, move fast
  • What is agile security?
  • Applying agility in practice
  • Focus on progress instead of perfection
  • Always ruthlessly prioritize
  • Myths and misconceptions that block security agility
  • Pursuing perfect security is a delusion
  • Pursuing perfect solutions is a perfect waste
  • Perfect plans are perfectly fragile
  • Scoping, sizing, and starting Zero Trust
  • Will Zero Trust work in my organization?
  • Is it better to go big or plan smaller projects?
  • Large Zero Trust transformations are the most effective
  • Good communication can catalyze executive sponsorship
  • Starting small is sometimes required
  • How do I ensure Zero Trust stays on track and continuously delivers value?
  • What is the best place to start Zero Trust?
  • Key terminology changes and clarification
  • Newer terminology - technical estate
  • Disambiguation - operations, operational, operating model, and so on
  • Summary
  • Chapter 7: What Zero Trust Success Looks Like
  • Zero Trust success factors
  • Factor one - clear strategy and plan
  • Factor two - security mindset and culture shifts.
  • Security risk is business risk
  • Security is a business enabler
  • Security is everyone's responsibility
  • Security risk accountability starts at the top
  • Assume compromise (assume breach)
  • Explicit validation of trust
  • Asset-centric and data-centric security
  • Cybersecurity is a team sport
  • Factor three - human empathy
  • Zero Trust provides a competitive advantage
  • Key cultural themes
  • Summary
  • Chapter 8: Adoption with the Three-Pillar Model
  • Introduction to the three pillars
  • Playbook structure
  • Playbook layout
  • The strategic pillar
  • The operational pillar
  • The operating model pillar
  • Stitching it all together with the Zero Trust Playbook
  • Zero Trust integration drives changes
  • Summary
  • Chapter 9: The Zero Trust Six-Stage Plan
  • Overview of the six-stage plan
  • Using the playbook stages effectively
  • The playbook stages in detail
  • Stage 1 - Establish a strategy
  • Stage 2 - Set up an operating model
  • Stage 3 - Create the architecture and model
  • Stage 4 - Tailor to the business
  • Stage 5 - Implement and improve
  • Stage 6 - Continuously monitor and evolve
  • Summary
  • Chapter 10: Zero Trust Playbook Roles
  • Role-based approach
  • Integration of roles with the six-stage plan
  • Zero Trust affects everyone
  • Role definition and naming
  • Illustrative list of roles
  • Per-role guidance
  • Role mission and purpose
  • Role creation and evolution
  • Key role relationships
  • Required skills and knowledge
  • Tooling and capabilities for each role
  • Zero Trust impact and imperatives for each role
  • Playbook-stage involvement for each role
  • A day in the life of Zero Trust for each role
  • Defining and measuring success
  • Summary of per-role guidance
  • Making it real
  • Summary
  • Book 1 summary
  • What's next in The Zero Trust Playbook Series
  • Index
  • Other Books You May Enjoy.