• Complain

Jason Garbis - Zero Trust Security: An Enterprise Guide

Here you can read online Jason Garbis - Zero Trust Security: An Enterprise Guide full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. publisher: Apress, genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Jason Garbis Zero Trust Security: An Enterprise Guide

Zero Trust Security: An Enterprise Guide: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Zero Trust Security: An Enterprise Guide" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Jason Garbis: author's other books


Who wrote Zero Trust Security: An Enterprise Guide? Find out the surname, the name of the author of the book and a list of all author's works by series.

Zero Trust Security: An Enterprise Guide — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Zero Trust Security: An Enterprise Guide" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Zero Trust Security Jason Garbis and Jerry W Chapman Zero - photo 1
Book cover of Zero Trust Security
Jason Garbis and Jerry W. Chapman
Zero Trust Security
An Enterprise Guide
1st ed.
Logo of the publisher Jason Garbis Boston MA USA Jerry W Chapman - photo 2
Logo of the publisher
Jason Garbis
Boston, MA, USA
Jerry W. Chapman
Atlanta, GA, USA

Any source code or other supplementary material referenced by the author in this book is available to readers on GitHub via the books product page, located at www.apress.com/9781484267011 . For more detailed information, please visit http://www.apress.com/source-code .

ISBN 978-1-4842-6701-1 e-ISBN 978-1-4842-6702-8
https://doi.org/10.1007/978-1-4842-6702-8
Jason Garbis and Jerry W. Chapman 2021
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Distributed to the book trade worldwide by Springer Science+Business Media New York, 1 New York Plaza, New York, NY 10004. Phone 1-800-SPRINGER, fax (201) 348-4505, e-mail orders-ny@springer-sbm.com, or visit www.springeronline.com. Apress Media, LLC is a California LLC and the sole member (owner) is Springer Science + Business Media Finance Inc (SSBM Finance Inc). SSBM Finance Inc is a Delaware corporation.

For Amy, Shira, and Shelly

J.G.

For my beautiful and loving wife, SuzetteThank you!

To our cherished daughters, Nena and AlexYou are loved!

J.W.C.

Foreword

Zero Trust wasnt born out of a need to sell another security control or solution. It was born from a desire to solve a real enterprise issueZero Trust is focused on simplicity and the reality of how things are now.

Dr. Chase Cunningham, aka Dr. Zero Trust

I have been waiting for this book for over two decades and am delighted to introduce its arrival.

Well before the Jericho Forums bold 2004 declaration of a new security strategy featuring de-perimeterization, many of us in the national security community had come to the realization that the perimeter security model was no longer a viable security strategy for Internet-connected systems and enterprises. The unsatiable thirst to connect everything to the Internet, the rising cost and complexity of the layers of security tools, and the rapid pace of technological change were fracturing the perimeter security model around us. Our defense-in-depth security perimeter was a dike springing too many leaks for us to keep up with in any meaningful or fiscally responsible manner. The Jericho Forums work pointed in a different direction, giving many of us a new hope.

Sadly, like Grand Moff Tarkin on the Death Star, many security professionals and pundits had grown comfortable with the status quo and scoffed at the notion that a new approach to securing modern enterprises was needed. One security commentator went so far as to say the Jericho Forum missed the mark and derisively forecast that its work would likely end up on the scrap heap of unrealized ideas and wasted effort. I hope that he reads this book with a tinge of guilt and regret.

The work of the Jericho Forum did not go for naught, but it did not yield fruit right away either. After a little more than 5 years from the introduction of the de-perimeterization concept, John Kindervag, then an analyst at Forrester Research, in 2010 coined the phrase Zero Trust to describe the security model that organizations should not automatically trust anything outside or inside their perimeters, and instead must verify everything and anything before connecting them to their systems and granting access to their data.

For those of us in the military, Zero Trust was not a revolutionary security model. We had been practicing it with physical security throughout our careers. For example, every person was greeted by security personnel at the gates and had to produce proper identity credentials before being given access to the base. We practiced segmentation with protection zones around what were called priority A, B, and C resources. The flight line areas were the home of priority A assets and had tightly controlled access with armed guards. Role-based entry was tightly controlled and use of deadly force authorized against those who broke the red line. As a lieutenant, I had to go through four levels of security before I could even get into my office. Security was ingrained in our culture, our processes, and our expectations.

Sadly, as my generation incrementally built out the Department of Defense Information Networks, while we followed a Zero Trust physical security model to protect our most valued facilities and weapons systems, the technology to implement a Zero Trust security model to protect our increasingly valuable and Internet-connected digital assets was lacking. Commercially available tools were exquisitely complex and expensive. For example, we had to contract with one noted vendor to create an academy just to train our already highly skilled workforce to properly use their complex networking products. Costs continued to soar as we continued our march to digitize every function we could, yet the security perimeter dike around us continued springing leaks. By the time I retired from federal service as the Chief Information Security Officer of the US government, I had come to the conclusion that the Zero Trust security strategy was our only hope to secure our digital ecosystem.

The COVID-19 pandemic spurred a massive pivot from traditional office environments to a work-from-home model that has accelerated the long-anticipated move to the Zero Trust security strategy. The illusion of the security perimeter has been shattered by massive mobility, cloud computing, Software-as-a-Service, and unparalleled Bring-Your-Own-Device implementation as organizations everywhere pivoted from traditional enterprise environments to todays modern digital reality. Todays reality is that the traditional network security perimeter is dead; there is no outside or inside anymore.

Sadly, many people and organizations, including that naysayer who scoffed at the Jericho Forums vision, have jumped on the Zero Trust bandwagon. Many declare allegiance to Zero Trust yet dont know what it really is or how to practice it. Organizations whose legacy networking gear and methodologies have proven exceedingly complex and vulnerable have their marketing teams miraculously declare their vulnerable capabilities to be Zero Trust. Despite the great Zero Trust research conducted by Forresters Dr. Chase Cunningham and Gartners Neil MacDonald, until this book, there wasnt a practical definitive guide to Zero Trust.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Zero Trust Security: An Enterprise Guide»

Look at similar books to Zero Trust Security: An Enterprise Guide. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Zero Trust Security: An Enterprise Guide»

Discussion, reviews of the book Zero Trust Security: An Enterprise Guide and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.