Zero Trust Networks: Building Secure Systems in Untrusted Networks (Paperback)
暫譯: 零信任網路:在不受信任的網路中建立安全系統 (平裝本)

Evan Gilman, Doug Barth

買這商品的人也買了...

商品描述

The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an all-too-familiar scenario today. With this practical book, you’ll learn the principles behind zero trust architecture, along with details necessary to implement it.

The Zero Trust Model treats all hosts as if they’re internet-facing, and considers the entire network to be compromised and hostile. By taking this approach, you’ll focus on building strong authentication, authorization, and encryption throughout, while providing compartmentalized access and better operational agility.

  • Understand how perimeter-based defenses have evolved to become the broken model we use today
  • Explore two case studies of zero trust in production networks on the client side (Google) and on the server side (PagerDuty)
  • Get example configuration for open source tools that you can use to build a zero trust network
  • Learn how to migrate from a perimeter-based network to a zero trust network in production

商品描述(中文翻譯)

網路周邊防禦可能並不像你想的那麼安全。防火牆後的主機並沒有自己的防禦,因此當「受信任」區域中的主機被攻破時,對你的資料中心的訪問也不會遙遠。這是當今一個過於熟悉的情境。在這本實用的書中,你將學習零信任架構背後的原則,以及實施它所需的細節。

零信任模型將所有主機視為面向互聯網,並認為整個網路都是被攻破和敵對的。採取這種方法後,你將專注於在整個系統中建立強大的身份驗證、授權和加密,同時提供分隔的訪問和更好的操作靈活性。

- 了解基於周邊的防禦如何演變成我們今天使用的破損模型
- 探索兩個零信任在生產網路中的案例研究,分別在客戶端(Google)和伺服器端(PagerDuty)
- 獲取開源工具的範例配置,以便你可以用來建立零信任網路
- 學習如何將基於周邊的網路遷移到生產中的零信任網路