61.4 Paradigm Shift: Border Control/ Cont. Scrutiny
315.1 Why Microsegmentation Is a Zero Trust Req.
71.5 Manager's Checklist
325.2 Abstract Access from Physical Network Topology
81.6 What This Chapter Establishes
335.3 Governing East-West Traffic
92 Governing Principles of Zero Trust Arch
345.4 Segmentation in Non-Standard Environments
102.1 Removing the Free Pass for Network Location
355.5 Manager's Checklist: Microsegmentation
112.2 Least-Privilege Access as a Living Policy
365.6 What This Means for Your Program
122.3 Design Sys That Expect to Be Compromised
376 Data Class, Encrypt & Access Govern
132.4 Principles in Practice: Avoiding Zero Trust Theater
386.1 Classification Arch Input, Not Compliance
142.5 Manager's Checklist
396.2 Encrypt. That Works Across Full Data Lifecycle
152.6 What This Chapter Establishes
406.3 Access Govern. Keeping Perm. Honest Over Time
163 Components, Control Planes, Policy Engines
416.4 Data Protection in Regulated Environments
173.1 Policy : Where Access Dec. Are Actually Made
426.5 Data Classification, Encrypt, & Access Govern
183.2 Policy Admin Enforcement Points
436.6 What This Means for Your Program
193.3 Control Plane vs. Data Plane
447 From Whiteboard to Production
203.4 Ref Archs: Fed, Healthcare, and Enterprise Patterns
457.1 Current-State Assessment and Gap Analysis
213.5 Manager's Checklist
467.2 Maturity Models as Navigation Tools
223.6 What This Chapter Establishes
477.3 Run Proof-of-Concept Programs That Inform
234 Identity as the New Security Perimeter
487.4 Metrics That Reflect Security Outcomes
244.1 Full Roster Identities Zero Trust Must Account For
497.5 Manager's Checklist: From Whiteboard to Prod
254.2 Strong Auth Without Friction: Making MFA Work