Full description not available
S**R
deFacto Reference Guide for Understanding and Building a Zero Trust Network
This book is perhaps the first complete commercial publication on this topic. It describes and characterizes the ZTN without prescribing a specific technology implementation. This book is a must-read for understanding the basis of an implementation and for balancing the claims of a vendor. At 216 pages it is packed with information; it might take a while to absorb fully the rich content. For me, it is best to absorb it in small chunks over an extended period of time.Of the 10 chapters, a particularly juicy one is chapter 8 "Trusting the Traffic" that explains networking fundamentals along with a detailed analysis of encryption; notably TLS and IPSEC. Chapter 6 "Trusting Users" conveys some heavy details of Identification and Authentication along with an emphasis on the need to create trusted hardware.For a person who participates in securing computer networks or has a desire to understand network security protocols in details, this book is a great read. For the fullest effect it is not a quick read but it has much to teach.
G**R
No Trust
This book really re-shaped my way of thinking about network security, breaking down concept by concept (with little focus on implementation details, which makes it more widely relevant to me) it goes through the main points to change the network architecture into a Beyond Corp (Google) like pattern. I learned a lot, and now I know what to go after as far as the actual implementation details, tools and frameworks for my company.
K**E
Helps with Unknown Unknowns.
The value of this book is in pointing out many "unknown unknowns". These are the things that are not accounted for that need to be taken into consideration. It does a good job of summarizing the overall process and goes into a fair amount of (PHB focused) detail on things like TPM, trust scores, and process.The main downside is that it talks mostly to an ideal environment or greenfield deployments. I was looking specifically for the boit-on tooling that can help with my environments. There's a general assumption that many of the policies and associated infrastructure can be readily added but this is not the typical case in my setups.All said, it's a well-written book and easy to comprehend. The pacing and level of detail is great for infrastructure architecture, but quite obviously cannot go into depth on any one topic.
N**N
Fantastic technical overview
I remember first hearing about Zero Trust and it sounded like a nebulous model that required a high-end firewall to sit at the center of it all, keeping an eye on traffic. This book rebukes that and give practical, common sense examples of how to create it. The authors even suggest a slow rollout...more proof of the practicality of this book.
S**N
A must read for anyone interested in ZTN
I read this book few months back. Its long overdue. I was at RSAC 2019 and bunch of vendors talk about ZTN. Before you start to buy / deploy any product in the name of ZTN, please read this book. This book does not talk about one specific product but rather describes all the integrations and risk . Its a must read for everyone at any level.
G**G
Great book on emerging information security implementation model
Zero Trust is emerging as the next model to adapt and secure the models of today's operating environment (e.g., Cloud and internal). This book provides a great overview of the topic. I think more work on diagrams if another version is done, but they are adequate for the discussion in current level of discussion.
C**Y
Very Through Overview if Zero Trust Networks
This book starts with defining what Zero Trust Networks are and uses very familiar terminology to help readers understand that they actually are attainable with the technology that you may already have in your data center albeit with changes to thought and practice which may sometimes be harder that the technical challenges. There was a huge focus on networks but I guess that is too be expected. I would love more information about the best software architectures for applications that must run within a Zero Trust Network. How does this network based shift in security affect well known design patterns?
R**S
Great foundation
Great intro to zero trust. It’s a must read for beginners and a refresher for Subject Matter Experts.
TrustPilot
5天前
1天前