Zero Trust Security : A Hands-on Guide
in Zero Trust Security include: Why perimeter security is inefficient, why Zero Trust projects fail, and how to implement Zero Trust correctly and effectively Installation and use of Docker Compose and understanding of Docker Compose .yml files Elements of network segmentation including physical and logical segmentation and key technologies Techniques for network monitoring such as network taps, switch port analyzers (SPAN), and encrypted traffic Identity access management (IAM), covering credential rotation, multi-factor authentication, and single sign-on (SSO) Zero Trust Security is an essential resource on the subject for IT managers, security architects, DevOps engineers, compliance officers, and cyber security practitioners. The book is also highly valuable for students in related programs of study seeking to understand the latest developments in the field. [Publisher's Text]
379155 characters.
-
Informazioni
ISBN: 9781394361106
