Micro-Segmentation: Implementation Guide
"Secure Beyond Breach"
Learn how to implement a micro-segmentation security strategy
Securing the perimeter is no longer enough. The focus has shifted to ensuring your organization continues to function if and when you’re breached — and that’s what micro-segmentation is all about.
This book will help you become secure beyond breach.
Based on real-world scenarios and written by industry experts who have been in the trenches, Secure Beyond Breach is a practical guide that details how to implement a micro-segmentation strategy from start to finish. It's an essential read for all cybersecurity professionals, from security architects to IT infrastructure teams to CISOs.
How to implement a micro-segmentation strategy
Chapter 1: Introduction: The Evolving Cybersecurity Landscape
Why micro-segmentation and where it starts
Chapter 2: Preparing Your Organization for Success
Who should be involved in micro-segmentation and key steps to prepare
Chapter 3: The Green Pill of Metadata
How to ensure high-quality metadata from the start
Chapter 4: Don’t Boil the Ocean
How to begin the process of micro-segmentation implementation
Chapter 5: Mapped Out: Application Dependency Maps and the Path to Security
Why you need a map of your applications (and who will use it)
Chapter 6: The Specifics of the Policy Decision Process
Best practices for making policy decisions
Chapter 7: Considerations for Cloud and Containers
Essential considerations for public cloud and containers
Chapter 8: Sustainment
How to sustain your security segmentation project over time
Chapter 9: Conclusion
Building a defense-in-depth micro-segmentation strategy