Mapping Transaction Flows for Zero Trust Security Architecture - Step 2
Cloud Security Alliance via YouTube
Google AI Professional Certificate - Learn AI Skills That Get You Hired
Build the Finance Skills That Lead to Promotions — Not Just Certificates
Overview
Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn how to effectively map transaction flows in Zero Trust architecture through this 53-minute video from Cloud Security Alliance. Explore comprehensive methods for analyzing system communications between Devices, Assets, Applications, and Services (DAAS) to gain granular visibility into business operations. Discover techniques for leveraging scanning tools and conducting thorough system analysis to understand communication patterns within and between protect surfaces. Master the process of mapping interactions with users and external services to inform security policy development. Gain insights into evaluating mapping practices through maturity models and understand how proper flow mapping can refine protect surfaces and strengthen Zero Trust implementations.
Syllabus
Step 2: Map the Transaction Flows for Zero Trust
Taught by
Cloud Security Alliance