Talk about your brand

Share information about your brand with your customers. Describe a product, make announcements, or welcome customers to your store.

Skip to product information
1 of 1

All Indian Reprints of O'Reilly are printed in Grayscale

This practical book provides a detailed explanation of the zero trust security model. Zero trust is a security paradigm shift that eliminates the concept of traditional perimeter-based security and requires you to "always assume breach" and "never trust but always verify." The updated edition offers more scenarios, real-world examples, and in-depth explanations of key concepts to help you fully comprehend the zero trust security architecture.

  • Examine fundamental concepts of zero trust security model, including trust engine, policy engine, and context aware agents
  • Understand how this model embeds security within the system's operation, with guided scenarios at the end of each chapter
  • Migrate from a perimeter-based network to a zero trust network in production
  • Explore case studies that provide insights into organizations' zero trust journeys
  • Learn about the various zero trust architectures, standards, and frameworks developed by NIST, CISA

About the author

Christina Morillo is an Enterprise Information Security and Technology Leader, and author, with tactical, technical and strategic experience building and leading information security programs. She brings a wealth of hands-on practical experience in technology & security operations, identity and access management, cloud security, security engineering, transformation, system administration, documentation and strategic communication.

As a results-driven executive, she adeptly blends technical expertise with problem-solving capabilities, excelling at forging robust relationships, and collaboratively driving strategic objectives through innovation and a relentless focus on achieving success.

As an author (Zero Trust Networks 2e, 97 Things, Future of Security, O’Reilly) she hopes to make security accessible, approachable, and digestible while keeping people and organizations secure.

About the author

Razi Rais is a cybersecurity leader with more than 20 years of expertise in building secure and resilient enterprise systems. He has been working with Microsoft for more than a decade, holding positions such as software engineer, architect, and product manager. His current focus at Microsoft is on building cutting-edge cybersecurity products and services. Razi is also a lead author of five books, including Zero Trust Networks, 2E (O'Reilly), Azure Confidential Computing and Zero Trust (O'Reilly) and others. In addition to being an active member of the GIAC Advisory Board, he speaks frequently at international conferences like RSA and conducts trainings on platforms such as O'Reilly and LinkedIn.

View full details