domain | zerotrustroadmap.org |
summary | To summarize, here are the steps you should follow to enhance security and accessibility of your SaaS application: 1. Move authoritative DNS or a CNAME record to the Application Reverse Proxy 2. Ensure all inbound ports for closed applications on your network are secure 3. Build policies based on user, device, and network context to define access permissions 4. Add the SaaS application to your SSO (Single Sign-On) provider 5. Create policies that enforce authorized users using the SSO provider 6. Add the IP address of your Secure Web Gateway (SWG) instance to the list of allowed applications in their base security settings 7. Create SWG policies to control access for SaaS apps. |
title | A Roadmap to Zero Trust Architecture |
description | This roadmap was built by security experts to provide a vendor agnostic Zero Trust architecture and example implementation timeline. The timeline assumes that an organization is beginning their Zero Trust journey from scratch, but is meant to be useful for all organizations. |
keywords | access, applications, trust, zero, application, security, team, network, data, gateway, private, users, traffic, internet, user, teams, products |
upstreams |
cloudflare.com |
downstreams |
microsoft.com, okta.com, pingidentity.com, onelogin.com, cloudflare.com, zscaler.com, yubico.com, jamf.com, kandji.io, crowdstrike.com, sentinelone.com, oomnitza.com, dnsfilter.com, netskope.com, catonetworks.com, aryaka.com, mimecast.com, titanhq.com, amazon.com, google.com, datadoghq.com, splunk.com, solarwinds.com, docontrol.io, cisa.gov, owasp.org, ansible.com, puppet.com, terraform.io |
nslookup | A 104.26.13.244, A 172.67.72.150, A 104.26.12.244 |
screenshot | |
created | 2024-02-26 |
updated | 2024-02-26 |
|
|