About the Technical Reviewer
4 Zero Trust in Practice - Part II Zero Trust and Enterprise Architecture Components
Identity and Access Management
Intrusion Detection and Prevention Systems
Next-Generation Firewalls
Privileged Access Management
Infrastructure and Platform as a Service
Part III Putting It All Together
A Zero Trust Policy Model
Making Zero Trust Successful - Conclusion - Afterword
Appendix A Further Reading: An Annotated List
Industry Standards and Specifications - Books
Research Documents and Publications