-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Zero Trust Overview and Playbook Introduction
By :

Because the Zero Trust experience is different for each type of role (business leaders, technology leaders, IT and security managers, and practitioners), we broke the series into different books focusing on groupings of related roles. Each playbook uses examples to illustrate how to apply Zero Trust to different scenarios.
Figure 2.1 shows how different roles can quickly find the information relevant to them:
Figure 2.1 – Playbook series structure
Each book focuses on the needs of specific roles, as outlined here:
The playbooks follow a three-pillar structure frequently used in business strategy and planning (strategic, operational, and operating models). This is described in detail in Chapter 8, Adoption with the Three-Pillar Model.
Now, let’s take a look at the approach and content of each type of book in the series.
Everyone—all roles need the critical common context on Zero Trust in this book, Zero Trust Overview and Playbook Introduction. This book defines what Zero Trust is and puts it into the context of digital transformation, information security, business risk and impact, and security strategy. It also provides an overview of the Zero Trust reference model and architecture, busts some common myths and misconceptions, and introduces the six-stage playbook, three-pillar model, role-based approach, Acme corporation examples, and more.
Business, technical, and security leadership roles each have a part in leading the Zero Trust transformation or integrating it with the organization’s business and risk management. This book describes in detail how leaders ensure Zero Trust delivers the full benefits of business agility and reduced organizational risk (while integrating it smoothly with digital business and cloud technology transformations). The book enables these leaders to quickly overcome common challenges and points of confusion (and conflict) that naturally arise during this process.
The Business and Technical Leadership Playbook provides role-by-role guidance for each of these leaders to drive success and avoid common challenges in this integration process.
This playbook includes guidance for these roles:
This playbook helps leaders build and execute a modern Zero Trust security strategy that minimizes business, technical, and security friction while aligning it to the organization’s goals, culture, and unique business model. The playbook includes guidance on prioritization, success criteria, common pitfalls and antipatterns, technology strategy/direction, and how to measvure progress and ongoing success in a quantifiable manner.
The Topic Playbooks focus on groups of roles with related goals, skills, or responsibilities in the organization. These provide a common context for related roles and role-by-role guidance for practitioner and manager roles to enable them to lead and execute their specific part of Zero Trust.
Note
Small organizations may not have dedicated roles for all of these functions, but someone should perform these functions at a basic level in every organization, whether a part of a job for an existing role, by an outsourced provider, or by another means.
These playbooks focus on topics including the following:
Architects are critical to the successful integration of silos
It is strongly recommended to assign architect role(s) with an explicit goal of building an end-to-end vision to help identify and resolve gaps in cross-team processes and cross-cutting capabilities. Integrating teams is critical as these transformations disrupt the norms of past responsibilities and team structures. Whether using an architect title or not, having a role focused on this end-to-end view is a key enabler for the success of digital, cloud, and Zero Trust transformations.
Without role(s) focused on finding and solving these problems, transformations can slow down or fail with different teams blaming each other—an outcome that benefits nobody. The playbook’s design, including a six-stage execution plan, includes mitigations for these challenges. See Chapter 9, The Zero Trust Six-Stage Plan, for more details.
Architects also work in many other roles across the organization and often need to familiarize themselves with those roles (and how Zero Trust is changing those roles) by reading their playbooks. The guidance for each role in the playbooks includes more detail on these interactions between architects and other teams.
In the modern agile delivery model that most digital enterprises operate in, product managers are responsible for integrating security into the product strategy they build to support business goals and steward business and customer data. These roles also work with product owners to translate the product strategy into product business requirements that meet security, business risk, and regulatory obligations. Solution and enterprise architects will often work with product managers to keep the product strategy and product requirements aligned with the organization’s over-arching strategy, methods, and compliance requirements. Security architects provide security oversight and governance, helping establish or update security architectures for these solutions. Application architects design technical solutions that meet the requirements and plan how to build applications and components, while developers implement these applications and components using security best practices and standards. DevOps/DevSecOps teams or technical operations teams enable this process by instrumenting and automating the development and operations, ensuring that security governance checks and best practices are automated, built in, and as frictionless as possible. Software security engineers provide security expertise for all roles along all the phases. The playbook guides these teams through the process of blending security expertise with product and application expertise as these roles build custom capabilities for the application and product portfolio(s).
Notes about the content in the playbooks
Security-focused: The playbooks focus on the security aspects of each role and only cover non-security aspects of the roles when that context is required for security.
Outcome-focused: The playbooks focus on the security outcomes that may be performed by technology teams, DevOps/DevSecOps teams, security teams, or outsourced providers. The playbooks also describe who performs the tasks when the specialization doesn’t exist so that you can quickly adapt the guidance to smaller organizations; see Chapter 10, Zero Trust Playbook Roles, for more details.
Durability-focused: The playbooks do not include step-by-step technical configuration instructions. Product technical details change too fast today for any written guidance to stay current for more than a few months. The playbooks include clear technical guidance and criteria that are immediately actionable and can drive decisions, but will also endure for years as technical roles and the technical estate transform with Zero Trust.
Real-world examples: These playbooks include many examples of how to apply this guidance in a real-world setting using Acme examples from multiple industries.
Everyone—all roles need clarity on the future trends that will shape and influence their role and Zero Trust so that they can anticipate changes coming around the corner.
This Zero Trust Futures book is for everyone and describes how to apply the Zero Trust approach to emerging technologies that are rapidly evolving and growing. This includes a discussion on the Internet of Things (IoT), artificial intelligence (AI), affective computing, the metaverse(s), and more.
The Zero Trust Playbook Series cuts through noise, connects people together, reduces conflict, and accelerates the benefits of Zero Trust. This format and structure set you and your organization up for success by providing a complete set of implications and perspectives, enabling teams to coordinate effectively, transform successfully, and execute rapidly.
Change the font size
Change margin width
Change background colour