What are the common challenges to adopting a zero trust network model? /
"Once you know what a zero trust network is, and what the advantages and disadvantages of moving to this model are, the next step is to understand some of the common challenges that you will face in implementing zero trust as a security model. Evan Gilman and Doug Barth discuss these challenges...
Clasificación: | Libro Electrónico |
---|---|
Formato: | Electrónico Video |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified] :
O'Reilly,
[2017]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Sumario: | "Once you know what a zero trust network is, and what the advantages and disadvantages of moving to this model are, the next step is to understand some of the common challenges that you will face in implementing zero trust as a security model. Evan Gilman and Doug Barth discuss these challenges, and give suggestions on how to overcome them. You will get tips on why to involve more than just your security team, why implementing policy as code is important, understanding why you should evaluate policies for their impact and value, and the overall scale of change involved in moving from a perimeter model to a zero trust model."--Resource description page |
---|---|
Notas: | Title from title screen (viewed September 7, 2017). Date of publication from resource description page. |
Descripción Física: | 1 online resource (1 streaming video file (6 min., 16 sec.)) |