Forem

# zerotrust

Implementing and discussing the Zero Trust security model and architecture.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Compute Zero Trust Effectiveness: Four Metrics That Survive a Breach
Cover image for How to Compute Zero Trust Effectiveness: Four Metrics That Survive a Breach

How to Compute Zero Trust Effectiveness: Four Metrics That Survive a Breach

Comments
5 min read
The Modernization Journey: How to Take a Legacy System From Zero Trust to AI Ready Without Rewrites or Downtime and Big Costs
Cover image for The Modernization Journey: How to Take a Legacy System From Zero Trust to AI Ready Without Rewrites or Downtime and Big Costs

The Modernization Journey: How to Take a Legacy System From Zero Trust to AI Ready Without Rewrites or Downtime and Big Costs

Comments
5 min read
We Replaced API Keys with Tokens That Self-Destruct in 5 Minutes
Cover image for We Replaced API Keys with Tokens That Self-Destruct in 5 Minutes

We Replaced API Keys with Tokens That Self-Destruct in 5 Minutes

1
Comments
5 min read
Enforcing Zero Trust: AWS VPC Encryption Controls Explained
Cover image for Enforcing Zero Trust: AWS VPC Encryption Controls Explained

Enforcing Zero Trust: AWS VPC Encryption Controls Explained

Comments 1
6 min read
How I Delivered a Cross‑Account, Cross‑Region, Multilingual, Multi‑Modal AWS Bedrock Solution in a Zero Trust Environment
Cover image for How I Delivered a Cross‑Account, Cross‑Region, Multilingual, Multi‑Modal AWS Bedrock Solution in a Zero Trust Environment

How I Delivered a Cross‑Account, Cross‑Region, Multilingual, Multi‑Modal AWS Bedrock Solution in a Zero Trust Environment

Comments
5 min read
Anatomy of a Real M365 Tenant

Anatomy of a Real M365 Tenant

Comments
15 min read
Technical Deep Dive: How I Delivered Zero Trust Security for a Client’s Legacy PHP System — Without Rewrites, Downtime, or...
Cover image for Technical Deep Dive: How I Delivered Zero Trust Security for a Client’s Legacy PHP System — Without Rewrites, Downtime, or...

Technical Deep Dive: How I Delivered Zero Trust Security for a Client’s Legacy PHP System — Without Rewrites, Downtime, or...

Comments
8 min read
Zero Trust Architecture: Why Good Intentions Are Not Enough

Zero Trust Architecture: Why Good Intentions Are Not Enough

Comments
15 min read
Stop Extending the Perimeter: Why Managed SASE and Universal ZTNA Are Replacing VPNs

Stop Extending the Perimeter: Why Managed SASE and Universal ZTNA Are Replacing VPNs

Comments
9 min read
Cloudflare Tunnel in 2026: Expose localhost Without Opening Ports or Buying an IP

Cloudflare Tunnel in 2026: Expose localhost Without Opening Ports or Buying an IP

Comments
5 min read
Technical Deep Dive: How I Delivered Zero Trust Security for a Client’s Legacy PHP System — Without Rewrites, Downtime, or...
Cover image for Technical Deep Dive: How I Delivered Zero Trust Security for a Client’s Legacy PHP System — Without Rewrites, Downtime, or...

Technical Deep Dive: How I Delivered Zero Trust Security for a Client’s Legacy PHP System — Without Rewrites, Downtime, or...

Comments
11 min read
Identity Beats IP Policy: What Forescout's New Segmentation Model Means for Multi-Vendor Networks

Identity Beats IP Policy: What Forescout's New Segmentation Model Means for Multi-Vendor Networks

Comments
8 min read
Zero Trust Requires IAM Hygiene, Not Just Products

Zero Trust Requires IAM Hygiene, Not Just Products

Comments
5 min read
Zero Trust Is Killing the Perimeter Playbook, Not Network Security Engineering

Zero Trust Is Killing the Perimeter Playbook, Not Network Security Engineering

Comments
5 min read
Zero Trust Requires IAM Hygiene, Not Just Products

Zero Trust Requires IAM Hygiene, Not Just Products

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.