Project Zero Trust – A Story about a Strategy for Aligning Security and the Business
Autor G Finneyen Limba Engleză Paperback – 21 sep 2022
Preț: 117.79 lei
Preț vechi: 147.24 lei
-20% Nou
Puncte Express: 177
Preț estimativ în valută:
22.54€ • 23.42$ • 18.72£
22.54€ • 23.42$ • 18.72£
Carte disponibilă
Livrare economică 11-25 ianuarie 25
Livrare express 31 decembrie 24 - 04 ianuarie 25 pentru 21.62 lei
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781119884842
ISBN-10: 1119884845
Pagini: 224
Dimensiuni: 183 x 243 x 13 mm
Greutate: 0.33 kg
Editura: Wiley
Locul publicării:Hoboken, United States
ISBN-10: 1119884845
Pagini: 224
Dimensiuni: 183 x 243 x 13 mm
Greutate: 0.33 kg
Editura: Wiley
Locul publicării:Hoboken, United States
Notă biografică
GEORGE FINNEY is the Chief Security Officer at Southern Methodist University. He has taught Cybersecurity at SMU and been recognized as one of the top 100 Chief Information Security Officers in the world by CISOs Connect. He has over 20 years' experience in the industry with startups, global telecommunication firms, and nonprofits.
Descriere scurtă
Cuprins
About the Author xi
Acknowledgments xiii
Foreword xv
Introduction xxi
Chapter 1: The Case for Zero Trust 1
Key Takeaways 10
Chapter 2: Zero Trust Is a Strategy 13
Key Takeaways 26
The Four Zero Trust Design Principles 27
The Five-Step
Zero Trust Design Methodology 27
The Zero Trust Implementation Curve 27
Chapter 3: Trust Is a Vulnerability 29
Key Takeaways 39
Chapter 4: The Crown Jewels 43
Key Takeaways 54
Chapter 5: The Identity Cornerstone 57
Key Takeaways 71
Chapter 6: Zero Trust DevOps 73
Key Takeaways 83
Chapter 7: Zero Trust SOC 87
Key Takeaways 100
Chapter 8: Cloudy with a Chance of Trust 103
Key Takeaways 113
Chapter 9: A Sustainable Culture 117
Key Takeaways 129
Chapter 10: The Tabletop Exercise 133
Key Takeaways 147
Chapter 11: Every Step Matters 151
Key Takeaways 159
Appendix A: Zero Trust Design Principles and Methodology 165
The Four Zero Trust Design Principles 165
The Five-Step Zero Trust Design Methodology 166
Appendix B: Zero Trust Maturity Model 167
Appendix C: Sample Zero Trust Master Scenario Events List 171
Appendix D: For Further Reading 179
Standards, Frameworks, and Other Resources 179
Case Studies 180
Google BeyondCorp Papers 180
Books 181
Hardening Guides 181
Glossary 183
Index 191