ABSTRACT

In a cloud-connected world, traditional technical data protection controls are no longer effective. Increasingly, compliance mandates focus on zero-trust architectures (ZTA). This chapter uses easy-to-digest language to explain key technical controls across the zero-trust pillars of identity and access management, endpoint security, network security, application security, and data security.