Best practices for securing your network
In the previous section of this chapter, Security operations excellence, we reviewed the Zero Trust principle. This assumes that breaches are inevitable and therefore we must ensure we have the right controls in place to verify each request. Identity management plays a critical role in this.
There are three principal objectives for securing your network in the Zero Trust model:
- Preparing to handle attacks in advance
- Reducing the attack surface and the extent of damage
- Strengthening your cloud footprint, including resources and configurations that are part of your environment, to reduce the chances of getting compromised
If your organization is enabling remote work and implementing an end-to-end Zero Trust framework, there are some best practices to adhere to in order to achieve these objectives:
- Network segmentation
- Threat protection
- Encryption
Let's take a closer look at each of them.
...