Download Publication
Who it's for:
- Zero Trust Architects and Implementation Teams
- CISOs and other CxOs
- Information Security Managers and Analysts
- Privacy and Compliance Officers
- IT Auditors and Assessors
- Software Developers
- Network Security Engineers
Defining the Zero Trust Protect Surface
Release Date: 03/05/2024
Working Group: Zero Trust
- The definition of Zero Trust and the Zero Trust protect surface
- How to initiate the Zero Trust implementation process by defining, analyzing, and prioritizing the organization’s protect surfaces
- How to identify the DAAS elements to be protected
- The risks and potential impacts of protect surface compromises
- The difference between the attack surface and the protect surface
Download this Resource
Acknowledgements
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA
Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).
I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.
Linke...
Shamik Kacker
Shruti Kulkarni
Information Security Architect, Elexon
I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and...
Krishna Narayanaswamy
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC
Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...
Interested in helping develop research with CSA?
Related Certificates & Training
Learn more