Zero Trust Networks: Building Secure Systems in Untrusted Networks by Evan Gilman
English | June 30, 2017 | ISBN: 1491962194 | 403 Pages | PDF | 5 MB
Perimeter defenses guarding your network aren’t as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a method that treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile.