Summary
In this chapter, we discussed the design and strategy for creating a Zero Trust architecture for identity and access. This included an overview of Zero Trust for identity and access management and how to design a strategy for access to cloud resources. We then learned ways to recommend an identity store for hybrid and guest access and recommend an authentication and authorization strategy.
Finally, we learned about the various strategies for designing CA policies, determining role assignments and delegation, handling privileged role access, and reviewing and governing privileged activities. We then wrapped up the chapter with a case study to provide design and architecture suggestions for Zero Trust for users, devices, and networks.
In the next chapter, you will learn how to design a strategy for regulatory compliance.