Home > Articles > Zero Trust Network Deployment

Zero Trust Network Deployment

Identifying Business Workflows

At the start of this chapter, we presented an approach to identify and define the trust for users and devices to allow access to different applications using zero trust principles. Now at the time of the deployment, you need to convert them into business workflows. Following are some of the common workflows:

  • On-premises employee with a trusted device accessing a private application in the local data center

  • On-premises employee with a trusted device accessing a private application in the cloud/SaaS

  • On-premises contractor with an untrusted device accessing private applications

  • On-premises guests with untrusted access accessing the Internet only

  • Remote employees with trusted devices accessing private applications in the data center

  • Remote employees with trusted devices accessing applications on SaaS

4. Applying Zero Trust Using SSE | Next Section Previous Section

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.