Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Zero Trust Overview and Playbook Introduction

You're reading from   Zero Trust Overview and Playbook Introduction Guidance for business, security, and technology leaders and practitioners

Arrow left icon
Product type Paperback
Published in Oct 2023
Publisher Packt
ISBN-13 9781800568662
Length 240 pages
Edition 1st Edition
Arrow right icon
Authors (2):
Arrow left icon
Mark Simos Mark Simos
Author Profile Icon Mark Simos
Mark Simos
Nikhil Kumar Nikhil Kumar
Author Profile Icon Nikhil Kumar
Nikhil Kumar
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Chapter 1: Zero Trust – This Is the Way 2. Chapter 2: Reading the Zero Trust Playbook Series FREE CHAPTER 3. Chapter 3: Zero Trust Is Security for Today’s World 4. Chapter 4: Standard Zero Trust Capabilities 5. Chapter 5: Artificial Intelligence (AI) and Zero Trust 6. Chapter 6: How to Scope, Size, and Start Zero Trust 7. Chapter 7: What Zero Trust Success Looks Like 8. Chapter 8: Adoption with the Three-Pillar Model 9. Chapter 9: The Zero Trust Six-Stage Plan 10. Chapter 10: Zero Trust Playbook Roles 11. Index 12. Other Books You May Enjoy

Consistency via a simple model and durable capabilities

A modern organization is complex and composed of many different specialized roles— business strategy, technology deployment and operation, financial performance, regulatory requirements, and so on. To keep everyone working in the same direction, it’s critical to provide a simple model that everyone can quickly understand, including a set of durable capabilities we can count on to stay consistent over time.

Creating this consistency early accelerates Zero Trust adoption and the value it brings—increased business agility and resilience to cyberattacks. This consistency reduces internal friction between teams, which holds back both business agility and security integration.

Because a Zero Trust transformation affects all aspects of security, it’s worthwhile to take a fresh look at security and revisit the core basic outcomes of the discipline. Information security is very similar to other security and safety disciplines as they all focus on these key outcomes:

  • Prevent bad things from happening as much as possible
  • Respond: Manage when bad things do happen to minimize damage and rapidly get back to normal
  • Learn from those experiences to improve prevention and response

For information security, these outcomes are expanded into a more detailed life cycle in the National Institute of Standards and Technology (NIST) Cybersecurity Framework of Identify, Protect, Detect, Respond, Recover, and Govern. This life cycle provides an excellent guide on the outcomes of security but still needs to be translated into the capabilities that security teams use to make those happen. Establishing a clear set of durable capabilities from security that stay consistent across technology and other changes is important both to guide security teams and to create a common language that allows technology, business, and security teams to work together.

We chose to use The Open Group’s initial Zero Trust Reference Model because it is a well-vetted, industry standard-driven approach that meets this need. This model is both simple and comprehensive, providing a clear picture of what to expect that makes sense to everyone, from business leaders to technologists and security practitioners.

Operations – a word with many meanings

You may note that the word operations and its variations are used in different ways in this series. This is because these similar terms are used across business, technology, and security teams in these different ways. See the Disambiguation – operations, operational, operating model, and so on section in Chapter 6, How to Scope, Size, and Start Zero Trust for a full reference of these terms and how they are used.

Now that we understand how critically important it is to have a simple model that is understood throughout the organization, let’s discuss this Zero Trust model.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime