Identifying Business Workflows
At the start of this chapter, we presented an approach to identify and define the trust for users and devices to allow access to different applications using zero trust principles. Now at the time of the deployment, you need to convert them into business workflows. Following are some of the common workflows:
On-premises employee with a trusted device accessing a private application in the local data center
On-premises employee with a trusted device accessing a private application in the cloud/SaaS
On-premises contractor with an untrusted device accessing private applications
On-premises guests with untrusted access accessing the Internet only
Remote employees with trusted devices accessing private applications in the data center
Remote employees with trusted devices accessing applications on SaaS