Skip to main content
DI

Zero Trust

Explore the zero trust security model based on the principle of 'never trust, always verify.' Learn about zero trust architecture, identity-centric security, continuous verification, microsegmentation, and practical migration strategies from perimeter-based security.

7 terms9 books1 comparisons

Key Terms

Multi-Factor Authentication

Trending

MFA

A security mechanism that requires users to provide two or more independent verification factors (something you know, have, or are) to authenticate their identity.

beginnerAuthenticationMFA

Zero Trust

Trending

A security model based on the principle of 'never trust, always verify' that requires strict identity verification for every person and device attempting to access resources, regardless of network location.

intermediateZero Trust

Privileged Access Management

PAM

A set of cybersecurity strategies, technologies, and practices for controlling, monitoring, securing, and auditing elevated access and permissions for users, accounts, and systems across an IT environment.

intermediatePAMGovernance

Least Privilege

A security principle that grants users, applications, and systems only the minimum access rights and permissions necessary to perform their required tasks, reducing the attack surface and blast radius.

beginnerAuthorizationZero Trust

Risk-Based Authentication

RBA

An adaptive authentication method that evaluates contextual risk signals (device, location, behavior patterns) to dynamically adjust the authentication requirements, requesting additional verification only when risk is elevated.

advancedAuthenticationThreat Detection

Step-Up Authentication

A security mechanism that requires a user to complete additional authentication challenges when attempting to access higher-risk resources or perform sensitive operations within an already authenticated session.

intermediateAuthenticationMFA

Adaptive Authentication

An authentication approach that dynamically adjusts security requirements based on real-time risk assessment, user behavior analysis, and contextual signals, balancing security with user experience.

advancedAuthenticationThreat Detection

Recommended Books

Zero Trust Networks

Evan Gilman

Zero Trust Networks

Evan Gilman, Doug Barth

4.4

Zero Trust Networks provides a thorough examination of the zero trust security model, where nothing inside or outside the network perimeter is trusted by default. The book covers network architecture, device trust, user trust, application trust, and how to build systems that verify every request regardless of source.

advancedZero TrustCybersecurity

Identity Attack Vectors

Morey J. Haber

Identity Attack Vectors

Morey J. Haber, Darran Rolls

4.3

Identity Attack Vectors explores the threat landscape targeting identity systems and provides practical guidance for implementing effective IAM solutions. It covers privileged access management, identity governance, attack patterns targeting credentials and identity stores, and defensive strategies.

intermediateIAMCybersecurity

Privileged Attack Vectors

Morey J. Haber

Privileged Attack Vectors

Morey J. Haber

4.2

This book examines how attackers exploit privileged accounts and provides comprehensive guidance on building a privileged access management program. It covers PAM architecture, credential vaulting, session management, just-in-time access, and measuring PAM program effectiveness.

intermediatePAMCybersecurity

Zero Trust Security

Jason Garbis

Zero Trust Security

Jason Garbis, Jerry W. Chapman

4.3

This enterprise guide provides a comprehensive framework for planning and implementing zero trust security. It covers the strategic, architectural, and operational aspects of zero trust, including identity-centric security, microsegmentation, software-defined perimeters, and continuous verification.

intermediateZero TrustCybersecurity

Cybersecurity Ops with bash

Paul Troncone

Cybersecurity Ops with bash

Paul Troncone, Carl Albing

4.1

Learn how to use the bash command line for cybersecurity operations including log analysis, network monitoring, malware analysis, and security auditing. Practical recipes for both offensive and defensive security tasks.

intermediateCybersecurityDevOps Security

IAM for Cloud Infrastructure

Marcus Young

IAM for Cloud Infrastructure

Marcus Young

4.4

A practical guide to identity and access management across major cloud platforms. Covers AWS IAM, Azure AD (Entra ID), and GCP IAM including policies, roles, service accounts, cross-cloud identity federation, and infrastructure-as-code for IAM.

intermediateCloud SecurityIAM

Comparisons