Home Page Icon
Home Page
Table of Contents for
Project Zero Trust
Close
Project Zero Trust
by George Finney, John Kindervag
Project Zero Trust
Cover
Title Page
About the Author
Acknowledgments
Foreword
Introduction
Chapter 1: The Case for Zero Trust
Chapter 2: Zero Trust Is a Strategy
Chapter 3: Trust Is a Vulnerability
Chapter 4: The Crown Jewels
Chapter 5: The Identity Cornerstone
Chapter 6: Zero Trust DevOps
Chapter 7: Zero Trust SOC
Chapter 8: Cloudy with a Chance of Trust
Chapter 9: A Sustainable Culture
Chapter 10: The Tabletop Exercise
Chapter 11: Every Step Matters
Appendix A: Zero Trust Design Principles and Methodology
Appendix B: Zero Trust Maturity Model
Appendix C: Sample Zero Trust Master Scenario Events List
Appendix D: For Further Reading
Glossary
Index
Copyright
Dedication
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cover
Next
Next Chapter
Title Page
Table of Contents
Cover
Title Page
About the Author
Acknowledgments
Foreword
Introduction
Chapter 1: The Case for Zero Trust
Key Takeaways
Chapter 2: Zero Trust Is a Strategy
Key Takeaways
Chapter 3: Trust Is a Vulnerability
Key Takeaways
Chapter 4: The Crown Jewels
Key Takeaways
Chapter 5: The Identity Cornerstone
Key Takeaways
Chapter 6: Zero Trust DevOps
Key Takeaways
Chapter 7: Zero Trust SOC
Key Takeaways
Chapter 8: Cloudy with a Chance of Trust
Key Takeaways
Chapter 9: A Sustainable Culture
Key Takeaways
Chapter 10: The Tabletop Exercise
Key Takeaways
Chapter 11: Every Step Matters
Key Takeaways
Appendix A: Zero Trust Design Principles and Methodology
The Four Zero Trust Design Principles
The Five-Step Zero Trust Design Methodology
Appendix B: Zero Trust Maturity Model
Appendix C: Sample Zero Trust Master Scenario Events List
Appendix D: For Further Reading
Standards, Frameworks, and Other Resources
Case Studies
Google BeyondCorp Papers
Books
Hardening Guides
Glossary
Index
Copyright
Dedication
End User License Agreement
Guide
Cover
Table of Contents
Title Page
Copyright
Dedication
About the Author
Acknowledgments
Foreword
Introduction
Begin Reading
Appendix A: Zero Trust Design Principles and Methodology
Appendix B: Zero Trust Maturity Model
Appendix C: Sample Zero Trust Master Scenario Events List
Appendix D: For Further Reading
Glossary
Index
End User License Agreement
Pages
iii
xi
xiii
xv
xvi
xvii
xviii
xix
xxi
xxii
1
2
3
4
5
6
7
8
9
10
11
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
179
180
181
183
184
185
186
187
188
189
190
191
192
193
194
195
196
iv
v
vii
197
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset