Who this book is for
This first book serves as both a standalone overview of Zero Trust for anyone and an introduction to the playbooks in Zero Trust Overview and Playbook Introduction. with a part to play in Zero Trust to understand what Zero Trust is, why it’s important to you, and what success looks like.
This table provides a list of roles that will benefit from this book:
Role Type |
Roles |
Organizational senior leaders |
Member of board of directors Chief Executive Officer (CEO) Chief Financial Officer (CFO) Chief Operating Officer (COO) Chief Legal Officer (CLO) Chief Privacy Officer (CPO) Chief Risk Officer (CRO) Chief Compliance Officer (CCO) Product and business line leaders Communications/public relations director |
Adjacent/ancillary roles |
Human resources Business analysts Internal readiness/training Internal and external communications |
Risk and compliance roles |
Risk team Compliance and audit team |
Technology senior leaders |
Chief Digital Officer (CDO) Chief Information Officer (CIO) Chief Technology Officer (CTO) Chief Information Security Officer (CISO) Enterprise security integration (deputy CISOs and staff, security [business] analysts) Technology directors Software delivery Vice President (VP) Security directors |
Architects |
Enterprise architects Security architects Infrastructure architects Business architects Information architects Access architects Solution architects Software/application architects |
Managers |
Technology managers Security managers Security Operations (SecOps) managers Product line managers/directors Product owners Software development directors Technology delivery managers Software testing/quality managers |
Security posture management |
Security posture management Security governance and compliance management People security (user education and insider risk) |
Technical engineering and operations |
Cloud engineering and operations Endpoint/productivity Identity Infrastructure CI/CD infrastructure Network Data security Operational Technology (OT) security Security posture engineering and operations |
Application and product security |
Software security engineers Software developers Software testers Supply chain security Internet of Things (IoT) security |
Security operations |
Triage analysts Investigation analysts Threat hunting Detection engineering Attack simulation (red and purple teaming) Incident management Threat intelligence |
Figure Preface.1 - Illustrative list of roles that enable Zero Trust
The book is written for people who are currently in these roles (and similar roles) as well as those who aspire to work in these roles, work with people in the roles, and provide consulting and advice to these roles.