• Complain

Razi Rais - Zero Trust Networks

Here you can read online Razi Rais - Zero Trust Networks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2024, publisher: OReilly Media, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Razi Rais Zero Trust Networks

Zero Trust Networks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Zero Trust Networks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Perimeter defenses guarding your network arent as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the trusted zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if theyre internet-facing, and considers the entire network to be compromised and hostile.In this updated edition, the authors show you how zero trust lets you focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility. Youll learn the architecture of a zero trust network, including how to build one using currently available technology.Explore fundamental concepts of a zero trust network, including trust engine, policy engine, and context aware agentsUnderstand how this model embeds security within the systems operation, rather than layering it on topUse existing technology to establish trust among the actors in a networkMigrate from a perimeter-based network to a zero trust network in productionExamine case studies that provide insights into various organizations zero trust journeysLearn about the various zero trust architectures, standards, and frameworks

Razi Rais: author's other books


Who wrote Zero Trust Networks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Zero Trust Networks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Zero Trust Networks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Zero Trust Networks by Razi Rais Christina Morillo Evan Gilman and Doug - photo 1
Zero Trust Networks

by Razi Rais , Christina Morillo , Evan Gilman , and Doug Barth

Copyright 2024 Christina Morillo and Razi Rais. All rights reserved.

Printed in the United States of America.

Published by OReilly Media, Inc. , 1005 Gravenstein Highway North, Sebastopol, CA 95472.

OReilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com.

  • Acquisitions Editor: Simina Calin
  • Development Editor: Michele Cronin
  • Production Editor: Christopher Faucher
  • Interior Designer: David Futato
  • Cover Designer: Karen Montgomery
  • December 2023: Second Edition
Revision History for the Early Release
  • 2022-10-04: First Release
  • 2022-11-09: Second Release
  • 2023-01-18: Third Release

See http://oreilly.com/catalog/errata.csp?isbn=9781492096597 for release details.

The OReilly logo is a registered trademark of OReilly Media, Inc. Zero Trust Networks, the cover image, and related trade dress are trademarks of OReilly Media, Inc.

The views expressed in this work are those of the authors and do not represent the publishers views. While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.

978-1-492-09653-5

Chapter 1. Zero Trust Fundamentals
A Note for Early Release Readers

With Early Release ebooks, you get books in their earliest formthe authors raw and unedited content as they writeso you can take advantage of these technologies long before the official release of these titles.

This will be the 1st chapter of the final book.

If you have comments about how we might improve the content and/or examples in this book, or if you notice missing material within this chapter, please reach out to the author at mcronin@oreilly.com.

In a time where network surveillance is ubiquitous, we find ourselves having a hard time knowing who to trust. Can we trust that our internet traffic will be safe from eavesdropping? Certainly not! What about that provider you leased your fiber from? Or that contracted technician who was in your datacenter yesterday working on the cabling?

Whistleblowers like Edward Snowden and Mark Klein have revealed the tenacity of government-backed spy rings. The world was shocked at the revelation that they had managed to get inside the datacenters of large organizations. But why? Isnt it exactly what you would do in their position? Especially if you knew that traffic there would not be encrypted?

The assumption that systems and traffic within a datacenter can be trusted is flawed. Modern networks and usage patterns no longer echo those that made perimeter defense make sense many years ago. As a result, moving freely within a secure infrastructure is frequently trivial once a single host or link there has been compromised.

You may think that an idea of using a cyberattack as a weapon to disrupt critical infrastructure like a nuclear plant or a power grid is far-fetched, but cyberattacks on the Colonial Pipeline in the United States and the Kudankulam Nuclear Power Plant in India serve as a stark reminder that critical infrastructure will continue to be a high-value target for attackers. So, what was common between the two attacks?

Well, in both cases, security was abysmal. Attackers took advantage of the fact that the VPN connection to Colonial Pipeline network was possible using a plain text password without any multi-factor authentication in-place. In the other example, malware was discovered on an Indian nuclear power plant employees computer that was connected to the administrative networks internet servers. Once the attackers gained access, they were able to roam within the network due to trust that comes with being inside the network.

Zero trust aims to solve the inherent problems in placing our trust in the network. Instead, it is possible to secure network communication and access so effectively that physical security of the transport layer can be reasonably disregarded. It goes without saying that this is a lofty goal. The good news is that weve got pretty powerful cryptographic algorithms these days, and given the right automation systems, this vision is actually attainable.

What Is a Zero Trust Network?

A zero trust network is built upon five fundamental assertions:

  • The network is always assumed to be hostile.

  • External and internal threats exist on the network at all times

  • Network locality alone is not sufficient for deciding trust in a network.

  • Every device, user, and network flow is authenticated and authorized.

  • Policies must be dynamic and calculated from as many sources of data as possible.

Traditional network security architecture breaks different networks (or pieces of a single network) into zones, contained by one or more firewalls. Each zone is granted some level of trust, which determines the network resources it is permitted to reach. This model provides very strong defense-in-depth. For example, resources deemed more risky, such as web servers that face the public internet, are placed in an exclusion zone (often termed a DMZ), where traffic can be tightly monitored and controlled. Such an approach gives rise to an architecture that is similar to some you might have seen before, such as the one shown in Figure 1-1.

Figure 1-1 Traditional network security architecture The zero trust model - photo 2
Figure 1-1. Traditional network security architecture

The zero trust model turns this diagram inside out. Placing stopgaps in the network is a solid step forward from the designs of yesteryear, but it is significantly lacking in the modern cyberattack landscape. There are many disadvantages:

  • Lack of intra-zone traffic inspection

  • Lack of flexibility in host placement (both physical and logical)

  • Single points of failure

It should be noted that, should network locality requirements be removed, the need for VPNs is also removed. A VPN (or virtual private network) allows a user to authenticate in order to receive an IP address on a remote network. The traffic is then tunneled from the device to the remote network, where it is decapsulated and routed. Its the greatest backdoor that no one ever suspected. If we instead declare that network location has no value, VPN is suddenly rendered obsolete, along with several other modern network constructs. Of course, this mandate necessitates pushing enforcement as far toward the network edge as possible, but at the same time relieves the core from such responsibility. Additionally, stateful firewalls exist in all major operating systems, and advances in switching and routing have opened an opportunity to install advanced capabilities at the edge. All of these gains come together to form one conclusion: the time is right for a paradigm shift. By leveraging distributed policy enforcement and applying zero trust principles, we can produce a design similar to the one shown in Figure 1-2.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Zero Trust Networks»

Look at similar books to Zero Trust Networks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Zero Trust Networks»

Discussion, reviews of the book Zero Trust Networks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.