Buy Zero Trust and Third-Party Risk by Gregory C. Rasner
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Computing and Information Technology > Computer networking and communications > Network security > Zero Trust and Third-Party Risk: Reduce the Blast Radius
Zero Trust and Third-Party Risk: Reduce the Blast Radius

Zero Trust and Third-Party Risk: Reduce the Blast Radius


     0     
5
4
3
2
1



Available


X
About the Book

Dramatically lower the cyber risk posed by third-party software and vendors in your organization

In Zero Trust and Third-Party Risk, veteran cybersecurity leader Gregory Rasner delivers an accessible and authoritative walkthrough of the fundamentals and finer points of the zero trust philosophy and its application to the mitigation of third-party cyber risk. In this book, you’ll explore how to build a zero trust program and nurture it to maturity. You will also learn how and why zero trust is so effective in reducing third-party cybersecurity risk.

The author uses the story of a fictional organization—KC Enterprises—to illustrate the real-world application of zero trust principles. He takes you through a full zero trust implementation cycle, from initial breach to cybersecurity program maintenance and upkeep. You’ll also find:

  • Explanations of the processes, controls, and programs that make up the zero trust doctrine
  • Descriptions of the five pillars of implementing zero trust with third-party vendors
  • Numerous examples, use-cases, and stories that highlight the real-world utility of zero trust

An essential resource for board members, executives, managers, and other business leaders, Zero Trust and Third-Party Risk will also earn a place on the bookshelves of technical and cybersecurity practitioners, as well as compliance professionals seeking effective strategies to dramatically lower cyber risk.



Table of Contents:

Foreword xiii

INTRODUCTION: Reduce the Blast Radius xvii

Part I Zero Trust and Third-Party Risk Explained 1

Chapter 1 Overview of Zero Trust and Third-Party Risk 3

Zero Trust 3

What Is Zero Trust? 4

The Importance of Strategy 5

Concepts of Zero Trust 6

1. Secure Resources 7

2. Least Privilege and Access Control 8

3. Ongoing Monitoring and Validation 11

Zero Trust Concepts and Definitions 13

Multifactor Authentication 13

Microsegmentation 14

Protect Surface 15

Data, Applications, Assets, Services (DAAS) 15

The Five Steps to Deploying Zero Trust 16

Step 1: Define the Protect Surface 16

Step 2: Map the Transaction Flows 17

Step 3: Build the Zero Trust Architecture 17

Step 4: Create the Zero Trust Policy 17

Step 5: Monitor and Maintain the Network 19

Zero Trust Frameworks and Guidance 20

Zero Trust Enables Business 22

Cybersecurity and Third-Party Risk 22

What Is Cybersecurity and Third-Party Risk? 23

Overview of How to Start or Mature a Program 25

Start Here 25

Intake, Questions, and Risk-Based Approach 27

Remote Questionnaires 28

Contract Controls 29

Physical Validation 30

Continuous Monitoring 31

Disengagement and Cybersecurity 33

Reporting and Analytics 34

ZT with CTPR 35

Why Zero Trust and Third-Party Risk? 35

How to Approach Zero Trust and Third-Party Risk 37

ZT/CTPR OSI Model 38

Chapter 2 Zero Trust and Third-Party Risk Model 43

Zero Trust and Third-Party Users 43

Access Control Process 44

Identity: Validate Third-Party Users with Strong Authentication 45

Five Types of Strong Authentication 47

Identity and Access Management 50

Privileged Access Management 52

Device/Workload: Verify Third-Party User Device Integrity 54

Access: Enforce Least-Privilege Access for Third-Party Users to Data and Apps 57

Groups 57

Work Hours 58

Geo-Location 58

Device-Based Restrictions 58

Auditing 59

Transaction: Scan All Content for Third-Party

Malicious Activity 59

IDS/IPS 60

DLP 60

SIEM 61

UBAD 61

Governance 62

Zero Trust and Third-Party Users Summary 62

Zero Trust and Third-Party Applications 63

Identity: Validate Third-Party Developers, DevOps, and Admins with Strong Auth 64

Privileged User Groups 64

Multifactor Authentication 64

Just-in-Time Access 65

Privileged Access Management 65

Audit and Logging 66

Device/Workload: Verify Third-Party Workload Integrity 66

Access: Enforce Least-Privilege Access for Third-Party Workloads

Accessing Other Workloads 67

Transaction: Scan All Content for Third-Party Malicious Activity and Data Theft 68

Zero Trust and Third-Party Applications Summary 70

Zero Trust and Third-Party Infrastructure 70

Identity: Validate Third-Party Users with Access to Infrastructure 71

Device/Workload: Identify All Third-Party Devices (Including IoT) 72

Software-Defined Perimeter 74

Encryption 74

Updates 75

Enforce Strong Passwords 75

Vulnerability and Secure Development Management 75

Logging and Monitoring 76

Access: Enforce Least-Privilege Access Segmentation for Third-Party Infrastructure 76

Transaction: Scan All Content Within the Infra for Third-Party Malicious Activity and Data Theft 77

Zero Trust and Third-Party Infrastructure Summary 78

Chapter 3 Zero Trust and Fourth-Party Cloud (SaaS) 79

Cloud Service Providers and Zero Trust 80

Zero Trust in Amazon Web Services 81

Zero Trust in Azure 83

Zero Trust in Azure Storage 85

Zero Trust on Azure Virtual Machines 87

Zero Trust on an Azure Spoke VNet 87

Zero Trust on an Azure Hub VNet 88

Zero Trust in Azure Summary 88

Zero Trust in Google Cloud 88

Identity-Aware Proxy 89

Access Context Manager 90

Zero Trust in Google Cloud Summary 91

Vendors and Zero Trust Strategy 91

Zero Trust at Third Parties as a Requirement 91

A Starter Zero Trust Security Assessment 92

A Zero Trust Maturity Assessment 95

Pillar 1: Identity 98

Pillar 2: Device 101

Pillar 3: Network/Environment 104

Pillar 4: Application/Workload 107

Pillar 5: Data 110

Cross-cutting Capabilities 113

Zero Trust Maturity Assessment for Critical Vendors 115

Part I: Zero Trust and Third-Party Risk

Explained Summary 119

Part II Apply the Lessons from Part I 121

Chapter 4 KC Enterprises: Lessons Learned in ZT and CTPR 123

Kristina Conglomerate Enterprises 124

KC Enterprises’ Cyber Third-Party Risk Program 127

KC Enterprises’ Cybersecurity Policy 127

Scope 127

Policy Statement and Objectives 128

Cybersecurity Program 128

Classification of Information Assets 129

A Really Bad Day 130

Then the Other Shoe Dropped 133

Chapter 5 Plan for a Plan 139

KC's ZT and CTPR Journey 139

Define the Protect Surface 143

Map Transaction Flows 146

Architecture Environment 148

Deploy Zero Trust Policies 159

Logical Policies and Environmental Changes 159

Zero Trust for Third-Party Users at KC Enterprises 161

Third-Party User and Device Integrity 161

Third-Party Least-Privileged Access 163

Third-Party User and Device Scanning 165

Zero Trust for Third-Party Applications at KC Enterprises 166

Third-Party Application Development and Workload Integrity 166

Third-Party Application Least-Privileged Access Workload to Workload 168

Third-Party Application Scanning 168

Zero Trust for Third-Party Infrastructure at KC Enterprises 169

Third-Party User Access to Infrastructure 169

Third-Party Device Integrity 170

Third-Party Infrastructure Segmentation 170

Third-Party Infrastructure Scanning 171

Written Policy Changes 172

Identity and Access Management Program 172

Vulnerability Management Program 173

Cybersecurity Incident Management Program 174

Cybersecurity Program 175

Cybersecurity Third-Party Risk Program 175

Third-Party Security Standard 177

Information Security Addendum 181

Assessment Alignment and Due Diligence 198

Third-Party Risk Management Program 202

Legal Policies 203

Monitor and Maintain 205

Part II: Apply the Lessons from Summary 206

Acknowledgments 209

About the Author 211

About the Technical Editor 211

Index 213



About the Author :

GREGORY C. RASNER is the author of the previous book Cybersecurity & Third-Party Risk: Third-Party Threat Hunting and the content creator of training and certification program "Third-Party Cyber Risk Assessor" (Third Party Risk Association, 2023). Greg is the co-chair for ISC2 Third-Party Risk Task Force and is an advisor to local colleges on technology and cybersecurity.


Best Sellers


Product Details
  • ISBN-13: 9781394203147
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Height: 229 mm
  • No of Pages: 240
  • Returnable: Y
  • Spine Width: 20 mm
  • Weight: 532 gr
  • ISBN-10: 1394203144
  • Publisher Date: 02 Oct 2023
  • Binding: Hardback
  • Language: English
  • Returnable: Y
  • Returnable: Y
  • Sub Title: Reduce the Blast Radius
  • Width: 152 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Zero Trust and Third-Party Risk: Reduce the Blast Radius
John Wiley & Sons Inc -
Zero Trust and Third-Party Risk: Reduce the Blast Radius
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Zero Trust and Third-Party Risk: Reduce the Blast Radius

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!