Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Mapping Transaction Flows for Zero Trust Security Architecture - Step 2

Cloud Security Alliance via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how to effectively map transaction flows in Zero Trust architecture through this 53-minute video from Cloud Security Alliance. Explore comprehensive methods for analyzing system communications between Devices, Assets, Applications, and Services (DAAS) to gain granular visibility into business operations. Discover techniques for leveraging scanning tools and conducting thorough system analysis to understand communication patterns within and between protect surfaces. Master the process of mapping interactions with users and external services to inform security policy development. Gain insights into evaluating mapping practices through maturity models and understand how proper flow mapping can refine protect surfaces and strengthen Zero Trust implementations.

Syllabus

Step 2: Map the Transaction Flows for Zero Trust

Taught by

Cloud Security Alliance

Reviews

Start your review of Mapping Transaction Flows for Zero Trust Security Architecture - Step 2

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.