دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [1 ed.]
نویسندگان: Abbas Kudrati. Binil A. Pillai
سری:
ISBN (شابک) : 1032125489, 9781032125480
ناشر: CRC Press
سال نشر: 2022
تعداد صفحات: 212
[237]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 24 Mb
در صورت ایرانی بودن نویسنده امکان دانلود وجود ندارد و مبلغ عودت داده خواهد شد
در صورت تبدیل فایل کتاب Zero Trust Journey Across the Digital Estate به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب سفر صفر اعتماد در سراسر املاک دیجیتال نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
\"اعتماد صفر استراتژیای است که سازمانها برای جلوتر از تهدیدات سایبری باید اجرا کنند. این صنعت بیش از 30 سال شکست قطعی دارد که به ما نشان میدهد که رویکردهای گذشته ما، در حالی که تلاشهای جدیشان را انجام دادهاند. Zero Trust به طور استراتژیک بر روی آن تمرکز می کند و به طور سیستماتیک قدرت و ابتکاراتی را که هکرها و دشمنان باید برنده شوند در حالی که کنترل های امنیتی را دور می زنند حذف می کند. این کتاب به شما و سازمانتان کمک می کند تا درک بهتری از آنچه که Zero Trust واقعاً چیست، تاریخچه آن، داشته باشید. و برای به دست آوردن دانش تجویزی که به شما و کسب و کارتان کمک می کند در نهایت در مسابقه شطرنج که استراتژی امنیت سایبری است، حریفان را شکست دهید.\"
دکتر. چیس کانینگهام (با نام مستعار دکتر صفر اعتماد)، متخصص سایبرافزار
سازمانهای امروزی به رویکرد امنیتی جدیدی نیاز دارند که به طور موثر با چالشهای محیط مدرن سازگار باشد، نیروی کار سیار را در بر بگیرد و از افراد، دستگاه ها، برنامه ها و داده ها در هر کجا که قرار دارند محافظت می کند. Zero Trust به طور فزاینده ای به رویکرد امنیتی حیاتی انتخابی برای بسیاری از شرکت ها و دولت ها تبدیل می شود. با این حال، رهبران امنیتی اغلب با تغییرات قابل توجهی در استراتژی و معماری مورد نیاز برای اجرای جامع Zero Trust دست و پنجه نرم میکنند.
این کتاب به دنبال ارائه یک نمای کامل از صفر است. رویکرد اعتماد در سراسر املاک دیجیتالی سازمانها که شامل استراتژی، الزامات تجاری، معماری، راهحلها، عناصر انسانی و رویکردهای پیادهسازی است که میتواند موفقیت این سازمانها را در یادگیری، تطبیق و اجرای Zero Trust افزایش دهد. این کتاب با بحث در مورد آینده Zero Trust در زمینه هایی مانند هوش مصنوعی، فناوری بلاک چین، فناوری عملیاتی (OT) و حاکمیت، ریسک و انطباق به پایان می رسد.
این کتاب برای تصمیم گیرندگان تجاری، رهبران امنیت سایبری، متخصصان فنی امنیتی و عوامل تغییر سازمانی که می خواهند املاک دیجیتال خود را با رویکرد Zero Trust مدرن کنند، ایده آل است.
"Zero Trust is the strategy that organizations need to implement to stay ahead of cyber threats, period. The industry has 30 plus years of categorical failure that show us that our past approaches, while earnest in their efforts have not stopped attackers. Zero Trust strategically focuses on and systematically removes the power and initiatives hackers and adversaries need to win as they circumvent security controls. This book will help you and your organization have a better understanding of what Zero Trust really is, it's history, and to gain prescriptive knowledge that will help you and your business finally begin beating the adversaries in the chess match that is cyber security strategy."
Dr. Chase Cunningham (aka Dr. Zero Trust), Cyberware Expert
Today’s organizations require a new security approach that effectively adapts to the challenges of the modern environment, embraces the mobile workforce, and protects people, devices, apps, and data wherever they are located. Zero Trust is increasingly becoming the critical security approach of choice for many enterprises and governments; however, security leaders often struggle with the significant shifts in strategy and architecture required to holistically implement Zero Trust.
This book seeks to provide an end-to-end view of the Zero Trust approach across organizations’ digital estates that includes strategy, business imperatives, architecture, solutions, human elements, and implementation approaches that could enhance these organizations' success in learning, adapting, and implementing Zero Trust. The book concludes with a discussion of the future of Zero Trust in areas such as artificial intelligence, blockchain technology, operational technology (OT), and governance, risk, and compliance.
The book is ideal for business decision makers, cybersecurity leaders, security technical professionals, and organizational change agents who want to modernize their digital estate with the Zero Trust approach.
Cover Half Title Title Copyright Dedication Contents Author Biographies Foreword Acknowledgment Introduction What Is Unique about This Book? Additional Resources Part 1 History, Introduction, and Fundamentals of Zero Trust 1 History of and Introduction to Zero Trust 1.1 Driving Forces 1.2 What Is Zero Trust? 1.3 The Inception of Zero Trust Concept 1.3.1 Cloud Security Alliance’s Software Define Perimeter and Zero Trust 1.3.2 Google’s BeyondCorp Zero Trust Model 1.3.3 Gartner’s CARTA Framework for Zero Trust 1.3.3.1 CARTA’s Zero Trust Implementation Approach 1.3.4 Netflix’s LISA Model for Zero Trust 1.3.4.1 LISA Principles 1.3.5 Forrester’s ZTX Framework 1.3.6 NIST SP 800:207 Zero Trust Framework 1.3.6.1 NIST’s Zero Trust Architecture Foundation 1.3.6.2 Policy Engine 1.3.6.3 Policy Administrator 1.3.6.4 Policy Enforcement Point 1.3.7 The Open Group Zero Trust’s Approach 1.3.7.1 Key Requirements for Zero Trust as per the Open Group 1.3.7.2 Organizational Value and Risk Alignment 1.3.7.3 Guardrails and Governance 1.3.7.4 Technology 1.3.7.5 Security Controls 1.3.8 Microsoft’s Zero Trust Principles 1.4 Why Zero Trust Is Important 1.5 Benefits of Zero Trust 1.6 Zero Trust Principle Redefined 1.6.1 Re-Examine All Default Access Controls 1.6.2 Micro-Segmentation 1.6.3 Preventing Lateral Movement 1.6.4 Leverage a Variety of Preventative Techniques 1.6.5 Enable Real-Time Monitoring and Controls to Identify and Halt Malicious Activity Quickly 1.6.6 Align to the Broader Security Strategy 1.7 Zero Trust for Everyone 1.7.1 Government 1.7.2 Enterprises 1.7.3 Small and Medium Businesses 1.7.4 Consumers 1.8 Chapter Summary 2 Zero Trust – Disrupting the Business Model 2.1 Why Business Leaders Care about Zero Trust 2.1.1 Agility Fuels Digital Transformation 2.1.2 The New (Reduced) Cost of Doing Business 2.1.3 Business Leaders’ Commitment to Support Zero Trust Adoption 2.2 Zero Trust Starts with a Culture 2.2.1 Know Your Organization 2.2.2 Inspire Trust 2.2.3 Managing Up and Around 2.2.4 A Philosophy of Ownership 2.3 Paradigm Shift in the Business Model 2.4 Zero Trust Security Is Vital for Hybrid Work 2.5 Human Elements of Zero Trust 2.5.1 Role of the Chief Information Officer 2.5.2 Role of Security Professionals 2.5.3 Using a Zero Trust Framework to Solve the Skills Gap 2.5.4 Role of Employees 2.6 Chapter Summary Part 2 Current Status and Best Practices of the Zero Trust Journey 3 Zero Trust Maturity and Implementation Assessment 3.1 Need for a Zero Trust Maturity Model 3.2 Our Unique Approach to a Zero Trust Maturity Model 3.2.1 Zero Trust Cybersecurity Maturity Assessment Toolkit 3.2.2 How to Use the Zero Trust Cybersecurity Maturity Assessment Tool? 3.3 Microsoft’s Three-Stage Maturity Model 3.3.1 Zero Trust Assessment Using Microsoft Compliance Manager 3.3.1.1 First Thing First: What Is Compliance Manager? 3.3.1.2 Zero Trust Integration for the Data Protection Baseline Template 3.4 CISA’s Zero Trust Maturity Model 3.5 Forrester’s ZTX Security Maturity Model 3.6 Palo Alto Zero Trust Maturity Assessment Model 3.7 Chapter Summary 4 Identity Is the New Security Control Plane 4.1 Why Identities and Why Now? 4.2 Identity – Building Trust in the Digital World 4.3 Implementation Pillars 4.3.1 Unification 4.3.1.1 Zero Trust Principle 4.3.1.2 Architecture Placement 4.3.1.3 Flow 4.3.1.4 Actionable Questions Checklist 4.3.1.5 Additional Focus Points and Considerations 4.3.1.5.1 End-to-End 4.3.1.5.2 Web and Non-Web Perspectives 4.3.1.5.3 Service Accounts 4.3.2 Context 4.3.2.1 Zero Trust Principle 4.3.2.2 Architecture Placement 4.3.2.3 Flow 4.3.2.3.1 Behavioral Baseline Flow (Learning Phase) 4.3.2.3.2 Single Authentication Flow 4.3.2.4 Actionable Questions Checklist 4.3.2.5 Additional Focus Points and Considerations 4.3.2.5.1 Complete Authentication Trail 4.3.2.5.2 Behavioral Profile 4.3.2.5.3 Unified Risk Analysis 4.3.3 Enforcement 4.3.3.1 Zero Trust Principle 4.3.3.2 Architecture Placement 4.3.3.3 Flow 4.3.3.4 Actionable Questions Checklist 4.3.3.5 Additional Focus Points and Considerations 4.3.3.5.1 Complete Environment Coverage 4.3.3.5.2 Access Policies Zoom-In 4.3.3.5.3 Rule-Based Policies 4.3.3.5.4 Pattern-Based Policies 4.3.3.5.5 Risk-Based Policies 4.3.4 Granularity 4.3.4.1 Zero Trust Principle 4.3.4.2 Architecture Placement 4.3.4.3 Flow 4.3.4.4 Actionable Questions Checklist 4.3.4.5 Additional Focus Points and Considerations 4.3.4.5.1 Resource vs. Network Segment 4.3.4.5.2 From Segment to Resource 4.3.4.5.3 From Resource to Access Attempt 4.3.4.5.4 Recap of the Assume Breach Component 4.4 Priorities for Modernizing Identity 4.4.1 Priority 1: Unify Identity Management 4.4.1.1 Control 1.1: Enable Single Sign-On 4.4.1.2 Control 1.2: External Identities 4.4.1.3 Control 1.3: Enable Passwordless Approach When Possible 4.4.1.4 Control 1.4: Automatic Provisioning 4.4.1.5 Control 1.5: Device Integration 4.4.1.6 Control 1.6: Managed Identities 4.4.2 Priority 2: Implement Secure Adaptive Access 4.4.2.1 Control 2.1: Secure Adaptive Authentication 4.4.2.2 Control 2.2: Block Legacy Authentication 4.4.2.3 Control 2.3: Protect Against Consent Phishing 4.4.2.4 Control 2.4: Equal Focus on On-Prem Identity 4.4.3 Priority 3: Identity and Access Governance 4.4.3.1 Control 3.1: Automate Provisioning and De-Provisioning 4.4.3.2 Control 3.2: Access Lifecycle Management and Separation of Duties 4.4.3.3 Control 3.3: Follow the Least Privilege Principle 4.4.4 Priority 4: Integrate and Monitor 4.4.4.1 Control 4.1: Log and Operationalize Identity Monitoring 4.4.4.2 Control 4.2: Integrate Identity for Auto Detection and Response 4.5 Chapter Summary 5 Zero Trust Architecture Components 5.1 Zero Trust Components Overview 5.2 Implementation Approach and Objectives 5.3 Protect the Data 5.4 Zero Trust in Multi-Cloud and Hybrid Environments 5.4.1 Customer Case Study: Zero Trust in the Hybrid Environment 5.4.1.1 About the Organization 5.4.1.2 Current Challenges 5.4.1.3 Top Three Challenges Faced While Implementing New Zero Trust Architecture 5.4.1.4 Impact and Benefits Achieved by a Zero Trust Project 5.5 Secure Access Service Edge and Zero Trust 5.5.1 Secure Access Service Edge Architecture Overview 5.5.1.1 Policy Evaluation and Enforcement Points 5.5.1.2 Microsoft Capabilities 5.5.2 Customer Case Study: Secure Access Service Edge Implementation 5.5.2.1 Current Situation and Current Challenges 5.5.2.2 Technology Solutions Used to Overcome the Challenges 5.5.2.3 Impact and Benefits Achieved 5.6 Identity Component 5.6.1 Identity Architecture Overview 5.6.1.1 Silverfort and Azure AD Integrated Identity Zero Trust Solution 5.6.1.2 Unification 5.6.1.3 Silverfort’s “Bridging” Capability 5.6.1.4 Context 5.6.1.5 Enforcement 5.6.1.6 Granularity 5.6.1.7 Illustrative Example: Protecting PowerShell to Domain Controller Access 5.6.2 Customer Case Study: Unified Identity Management with Zero Trust 5.6.2.1 About the Organization 5.6.2.2 Current Challenges 5.6.2.3 Technology Solutions Used to Overcome Existing Challenges 5.6.2.4 Top Three Challenges Faced While Implementing New Zero Trust Architecture 5.6.2.5 Benefits Achieved by Implementing Zero Trust Architecture 5.7 Endpoint or Devices Component 5.7.1 Endpoint or Devices Architecture Overview 5.7.1.1 Customer Case Study: Unified Endpoint or Device Management with Zero Trust 5.7.1.1.1 About the Organization 5.7.1.1.2 Current Challenges 5.7.1.1.3 Technology Solutions Used to Over the Challenges 5.7.1.1.4 Top 5 Challenges Faced While Implementing New Zero Trust Architecture 5.7.1.1.5 Impact and Benefits Achieved with Zero Trust Architecture 5.8 Application Component (on Prem, Legacy, Cloud, Mobile App) 5.8.1 Application Architecture Overview 5.9 Data Component 5.9.1 Data Architecture Overview 5.9.1.1 Mobile Application Management 5.9.1.2 End-to-End Encryption for Data Protection 5.9.2 Customer Case Study: Data Loss Prevention and Data Security Zero Trust 5.9.2.1 About the Organization 5.9.2.2 Current Situation Before the Zero Trust Model 5.9.2.3 Technology Solutions Used for Zero Trust Architecture 5.9.3 Top Three Challenges Faced While Implementing New Zero Trust Architecture 5.9.4 Impact and Benefits with Zero Trust Architecture 5.10 Infrastructure Component 5.10.1 Infrastructure Deployment Objectives 5.10.2 Network Component 5.10.3 Network Architecture Overview 5.10.3.1 Segment and Enforce the External Boundaries 5.10.3.2 Network Segmentation 5.10.3.3 Threat Protection 5.10.3.4 Encryption 5.11 Zero Trust and Operational Technology Component 5.11.1 A Practical Approach for Deploying Zero Trust for Operational Technology 5.11.2 Internet of Things and Operational Technology Architecture with Zero Trust Principles 5.12 Zero Trust and Security Operation Center 5.12.1 Security Operation Center Automation and Orchestration with Zero Trust 5.12.2 Security Operation Center Architecture Components 5.13 Defining DevOps in a Zero Trust World 5.13.1 Customer Case Study: DevOps and Application Security with Zero Trust 5.13.1.1 About the Organization 5.13.1.2 Current Situation and Current Challenges prior to Zero Trust Implementation 5.13.1.2.1 Mergers and Acquisitions 5.13.1.2.2 Office Engineering 5.13.1.3 Technology Solutions Used for Zero Trust Architecture 5.13.1.4 Top Three Challenges Faced While Implementing New Zero Trust Architecture 5.13.1.5 Impact and Benefits of Zero Trust 5.14 Chapter Summary 6 Zero Trust Project Plan and Program Approach 6.1 The Brave New World 6.2 Working Together as One Team 6.3 Journey to Zero Trust 6.4 Phase 1: Project Planning and Strategy Consideration 6.4.1 Phase 1.1: Is Zero Trust Project Right for You? 6.4.2 Phase 1.2: Build Your Strategy and Approach Using the Right Zero Trust Framework 6.4.3 Phase 1.3: Secure Support and Buy-In from All Stakeholders 6.4.4 Phase 1.4: Identify Key Interdependencies Across the Organization 6.5 Phase 2: Zero Trust Maturity Level and Project Roadmap 6.5.1 Phase 2.1: Building the Zero Trust Project Roadmap 6.6 Phase 3: Zero Trust Components Implementation Roadmap 6.6.1 Phase 3.1: Create a Roadmap to Increase Maturity for the Identity Domain 6.6.2 Phase 3.2: Create a Roadmap to Increase Maturity for the Endpoint Domain 6.6.3 Phase 3.4: Create a Roadmap to Increase Maturity for the Application Domain 6.6.4 Phase 3.5: Create a Roadmap to Increase Maturity for the Data Domain 6.6.5 Phase 3.6: Create a Roadmap to Increase Maturity for the Network Domain 6.6.6 Phase 3.7: Create a Roadmap to Increase Maturity for the Infrastructure Domain 6.6.7 Phase 3.8: Create a Roadmap to Increase Maturity for the Visibility, Analytics, Automation, and Orchestration Domains 6.7 Phase 4: Continuous Evaluation and Project Monitoring 6.8 Good, Bad and Ugly – Learnings from Early Adoption of Zero Trust 6.9 Chapter Summary Part 3 Future Horizon of Zero Trust 7 Future Horizon of Zero Trust 7.1 Enabling Zero Trust with Artificial Intelligence 7.1.1 Role of Artificial Intelligence from Zero Trust to Zero Authentication 7.2 Blockchain Technology as Zero Trust Enabler 7.2.1 Blockchain Technology 7.2.2 Decentralized Finance 7.3 Embracing Zero Trust for the Internet of Things and Operational Technology 7.3.1 Cybersecurity for the Internet of Things 7.3.2 A Practical Approach for Implementing Zero Trust for the Internet of Things 7.4 Zero Trust in Governance, Risk, and Compliance 7.4.1 Zero Trust Is the Best Digital Risk Management Approach 7.4.2 The Convergence of Data Governance and Zero Trust 7.5 Chapter Summary Index