Zero Trust Networks
Evan Gilman
Zero Trust Networks
Building Secure Systems in Untrusted Networks
by Evan Gilman, Doug Barth
Summary
Zero Trust Networks provides a thorough examination of the zero trust security model, where nothing inside or outside the network perimeter is trusted by default. The book covers network architecture, device trust, user trust, application trust, and how to build systems that verify every request regardless of source.
Why Read This Book
Zero trust is no longer optional for modern organizations. This book provides the architectural foundation for understanding and implementing zero trust principles, going beyond buzzwords to deliver practical, implementable guidance.
Key Takeaways
- The principles and evolution of zero trust architecture
- How to establish device, user, and application trust
- Network architecture patterns for zero trust environments
- Policy engines and trust computation
- Migration strategies from perimeter-based security to zero trust
Who Should Read This
Security architects and network engineers designing or migrating to zero trust architectures.
Frequently Asked Questions
What is "Zero Trust Networks" about?
Zero Trust Networks provides a thorough examination of the zero trust security model, where nothing inside or outside the network perimeter is trusted by default. The book covers network architecture, device trust, user trust, application trust, and how to build systems that verify every request regardless of source.
Who should read "Zero Trust Networks"?
Security architects and network engineers designing or migrating to zero trust architectures.
What are the key takeaways from "Zero Trust Networks"?
Key takeaways include: The principles and evolution of zero trust architecture; How to establish device, user, and application trust; Network architecture patterns for zero trust environments.