Cantitate/Preț
Produs

Zero Trust and Third-Party Risk

Autor Gregory C Rasner
en Limba Engleză Hardback – 3 oct 2023

Remarcăm în Zero Trust and Third-Party Risk o abordare riguroasă a metodologiei de securitate, axată pe reducerea „razei de explozie” (blast radius) în cazul compromiterii lanțului de aprovizionare digital. Gregory C Rasner nu se limitează la teorie, ci propune un cadru de lucru structurat în jurul a cinci piloni esențiali pentru gestionarea riscurilor asociate partenerilor externi. Descoperim aici o progresie logică, de la definirea suprafeței de protecție și maparea fluxurilor de tranzacții (DAAS - Data, Applications, Assets, Services), până la construcția efectivă a arhitecturii și monitorizarea continuă a rețelei. Pe linia practică a volumului Zero Trust Security de Jason Garbis, dar cu un focus distinct pe ecosistemul vendorilor, lucrarea de față transformă filozofia „never trust, always verify” într-un set de controale aplicabile. Observăm că autorul utilizează scenariul organizației fictive KC Enterprises pentru a ancora conceptele tehnice în realitatea operațională. Această metodă permite cititorului să urmărească un ciclu complet: de la breșa inițială de securitate, la implementarea microsegmentării și a autentificării multifactor, până la faza de mentenanță a programului de securitate cibernetică. Structura cărții, împărțită în secțiuni dedicate explicațiilor doctrinare și aplicațiilor practice, oferă o claritate rară în literatura de specialitate. Spre deosebire de Zero Trust Architecture de Cindy Green-Ortiz, care se concentrează pe arhitectura generală a sistemelor, Zero Trust and Third-Party Risk izolează și analizează veriga cea mai vulnerabilă a infrastructurii moderne: software-ul și serviciile furnizate de terți. Este o resursă tehnică ce pune accent pe guvernanță și pe maturizarea programelor de risc, fiind esențială pentru alinierea departamentelor de IT cu obiectivele de reziliență ale afacerii.

Citește tot Restrânge

Preț: 15478 lei

Preț vechi: 19347 lei
-20%

Puncte Express: 232

Carte disponibilă

Livrare economică 08-22 iunie
Livrare express 23-29 mai pentru 2799 lei


Specificații

ISBN-13: 9781394203147
ISBN-10: 1394203144
Pagini: 240
Dimensiuni: 160 x 232 x 12 mm
Greutate: 0.45 kg
Ediția:1
Editura: Wiley
Locul publicării:Hoboken, United States

De ce să citești această carte

Recomandăm această carte profesioniștilor IT și managerilor de risc care trebuie să securizeze infrastructuri complexe dependente de furnizori externi. Cititorul câștigă o metodologie clară pentru implementarea conceptelor de microsegmentare și acces cu privilegiu minim. Este un ghid indispensabil pentru a trece de la concepte abstracte la un program de securitate matur, capabil să limiteze impactul atacurilor asupra lanțului de aprovizionare.


Despre autor

Gregory C Rasner este un lider recunoscut în domeniul securității cibernetice, cu o experiență vastă în managementul riscurilor și implementarea arhitecturilor de tip Zero Trust. Expertiza sa se concentrează pe intersecția dintre securitatea operațională și guvernanța corporativă, fiind un susținător al integrării securității în procesele de business. Prin publicațiile sale la editura Wiley, Rasner contribuie la definirea standardelor moderne de protecție a datelor, aducând claritate în domenii complexe precum securitatea lanțului de aprovizionare și conformitatea digitală.


Notă biografică

GREGORY C. RASNER is the author of the previous book Cybersecurity & Third-Party Risk: Third-Party Threat Hunting and the content creator of training and certification program "Third-Party Cyber Risk Assessor" (Third Party Risk Association, 2023). Greg is the co-chair for ISC2 Third-Party Risk Task Force and is an advisor to local colleges on technology and cybersecurity.

Cuprins

Foreword xiii INTRODUCTION: Reduce the Blast Radius xvii Part I Zero Trust and Third-Party Risk Explained 1 Chapter 1 Overview of Zero Trust and Third-Party Risk 3 Zero Trust 3 What Is Zero Trust? 4 The Importance of Strategy 5 Concepts of Zero Trust 6 1. Secure Resources 7 2. Least Privilege and Access Control 8 3. Ongoing Monitoring and Validation 11 Zero Trust Concepts and Definitions 13 Multifactor Authentication 13 Microsegmentation 14 Protect Surface 15 Data, Applications, Assets, Services (DAAS) 15 The Five Steps to Deploying Zero Trust 16 Step 1: Define the Protect Surface 16 Step 2: Map the Transaction Flows 17 Step 3: Build the Zero Trust Architecture 17 Step 4: Create the Zero Trust Policy 17 Step 5: Monitor and Maintain the Network 19 Zero Trust Frameworks and Guidance 20 Zero Trust Enables Business 22 Cybersecurity and Third-Party Risk 22 What Is Cybersecurity and Third-Party Risk? 23 Overview of How to Start or Mature a Program 25 Start Here 25 Intake, Questions, and Risk-Based Approach 27 Remote Questionnaires 28 Contract Controls 29 Physical Validation 30 Continuous Monitoring 31 Disengagement and Cybersecurity 33 Reporting and Analytics 34 ZT with CTPR 35 Why Zero Trust and Third-Party Risk? 35 How to Approach Zero Trust and Third-Party Risk 37 ZT/CTPR OSI Model 38 Chapter 2 Zero Trust and Third-Party Risk Model 43 Zero Trust and Third-Party Users 43 Access Control Process 44 Identity: Validate Third-Party Users with Strong Authentication 45 Five Types of Strong Authentication 47 Identity and Access Management 50 Privileged Access Management 52 Device/Workload: Verify Third-Party User Device Integrity 54 Access: Enforce Least-Privilege Access for Third-Party Users to Data and Apps 57 Groups 57 Work Hours 58 Geo-Location 58 Device-Based Restrictions 58 Auditing 59 Transaction: Scan All Content for Third-Party Malicious Activity 59 IDS/IPS 60 DLP 60 SIEM 61 UBAD 61 Governance 62 Zero Trust and Third-Party Users Summary 62 Zero Trust and Third-Party Applications 63 Identity: Validate Third-Party Developers, DevOps, and Admins with Strong Auth 64 Privileged User Groups 64 Multifactor Authentication 64 Just-in-Time Access 65 Privileged Access Management 65 Audit and Logging 66 Device/Workload: Verify Third-Party Workload Integrity 66 Access: Enforce Least-Privilege Access for Third-Party Workloads Accessing Other Workloads 67 Transaction: Scan All Content for Third-Party Malicious Activity and Data Theft 68 Zero Trust and Third-Party Applications Summary 70 Zero Trust and Third-Party Infrastructure 70 Identity: Validate Third-Party Users with Access to Infrastructure 71 Device/Workload: Identify All Third-Party Devices (Including IoT) 72 Software-Defined Perimeter 74 Encryption 74 Updates 75 Enforce Strong Passwords 75 Vulnerability and Secure Development Management 75 Logging and Monitoring 76 Access: Enforce Least-Privilege Access Segmentation for Third-Party Infrastructure 76 Transaction: Scan All Content Within the Infra for Third-Party Malicious Activity and Data Theft 77 Zero Trust and Third-Party Infrastructure Summary 78 Chapter 3 Zero Trust and Fourth-Party Cloud (SaaS) 79 Cloud Service Providers and Zero Trust 80 Zero Trust in Amazon Web Services 81 Zero Trust in Azure 83 Zero Trust in Azure Storage 85 Zero Trust on Azure Virtual Machines 87 Zero Trust on an Azure Spoke VNet 87 Zero Trust on an Azure Hub VNet 88 Zero Trust in Azure Summary 88 Zero Trust in Google Cloud 88 Identity-Aware Proxy 89 Access Context Manager 90 Zero Trust in Google Cloud Summary 91 Vendors and Zero Trust Strategy 91 Zero Trust at Third Parties as a Requirement 91 A Starter Zero Trust Security Assessment 92 A Zero Trust Maturity Assessment 95 Pillar 1: Identity 98 Pillar 2: Device 101 Pillar 3: Network/Environment 104 Pillar 4: Application/Workload 107 Pillar 5: Data 110 Cross-cutting Capabilities 113 Zero Trust Maturity Assessment for Critical Vendors 115 Part I: Zero Trust and Third-Party Risk Explained Summary 119 Part II Apply the Lessons from Part I 121 Chapter 4 KC Enterprises: Lessons Learned in ZT and CTPR 123 Kristina Conglomerate Enterprises 124 KC Enterprises' Cyber Third-Party Risk Program 127 KC Enterprises' Cybersecurity Policy 127 Scope 127 Policy Statement and Objectives 128 Cybersecurity Program 128 Classification of Information Assets 129 A Really Bad Day 130 Then the Other Shoe Dropped 133 Chapter 5 Plan for a Plan 139 KC's ZT and CTPR Journey 139 Define the Protect Surface 143 Map Transaction Flows 146 Architecture Environment 148 Deploy Zero Trust Policies 159 Logical Policies and Environmental Changes 159 Zero Trust for Third-Party Users at KC Enterprises 161 Third-Party User and Device Integrity 161 Third-Party Least-Privileged Access 163 Third-Party User and Device Scanning 165 Zero Trust for Third-Party Applications at KC Enterprises 166 Third-Party Application Development and Workload Integrity 166 Third-Party Application Least-Privileged Access Workload to Workload 168 Third-Party Application Scanning 168 Zero Trust for Third-Party Infrastructure at KC Enterprises 169 Third-Party User Access to Infrastructure 169 Third-Party Device Integrity 170 Third-Party Infrastructure Segmentation 170 Third-Party Infrastructure Scanning 171 Written Policy Changes 172 Identity and Access Management Program 172 Vulnerability Management Program 173 Cybersecurity Incident Management Program 174 Cybersecurity Program 175 Cybersecurity Third-Party Risk Program 175 Third-Party Security Standard 177 Information Security Addendum 181 Assessment Alignment and Due Diligence 198 Third-Party Risk Management Program 202 Legal Policies 203 Monitor and Maintain 205 Part II: Apply the Lessons from Summary 206 Acknowledgments 209 About the Author 211 About the Technical Editor 211 Index 213

Descriere

Dramatically lower the cyber risk posed by third-party software and vendors in your organization In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you’ll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk. The author uses the story of a fictional organization—KC Enterprises—to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You’ll also find: Explanations of the processes, controls, and programs that make up the zero trust doctrine Descriptions of the five pillars of implementing zero trust with third-party vendors Numerous examples, use-cases, and stories that highlight the real-world utility of zero trustAn essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk.