Building Zero Trust Architecture with Hybrid Cloud Security Patterns
This chapter discusses the reference architectures and patterns for implementing the zero trust model. The principles for zero trust are also discussed in detail. We will discuss use cases requiring the zero trust model and how to use the hybrid cloud security patterns to protect critical data using zero trust security practices. The following diagram illustrates the zero trust pattern:
Figure 10.1 – Zero trust pattern
The topics discussed in this chapter include the following:
- Zero trust model
- Principles of zero trust
- Reference architecture for zero trust
- How to use hybrid cloud security patterns to take a zero trust approach