Summary
After exploring the attacker mindset over the last few chapters, here, we wrapped our heads around building a proactive defense strategy. We started off with an in-depth exploration of zero trust security principles, followed by its key benefits and association with DiD. It is important to reiterate that security is often very simple and intuitive, so always go back to the first principles. Ask yourself why a particular technology was developed and what it solves. A robust defense is not about following the news and trying to implement the latest security buzzword technology in your environment. Every organization is in a unique position with a unique set of assets, and it is very important to assess the cost of an exploit.
In the second part of this chapter, we focused on a particular technology: SOAR. The goal was to infuse a sense of freedom into modern security teams. Gone are the days when security operations center (SOC) teams would keep an eye on incoming vulnerabilities...