Zero Trust Publications

Zero Trust publications to follow and read

RESOURCES

John Spiegel

3/8/20263 min read

a man sitting on the floor in a library reading a book
a man sitting on the floor in a library reading a book

Influential Books & Publications

“Zero Trust Networks: Building Secure Systems in Untrusted Networks”Evan Gilman & Doug Barth. O’Reilly Media, 2017. ISBN 9781491962190. The first comprehensive book on Zero Trust architecture. Written by practitioners from Google and PagerDuty, it explains the shortcomings of perimeter security and details how to design a Zero Trust network from the ground up. The book covers core concepts (like securing workloads and using strong authentication everywhere) and real case studies, including Google’s BeyondCorp. Value: Provides technical guidance for engineers to implement Zero Trust using existing technologies (e.g. mutual TLS, identity-aware proxies) with an emphasis on never trust, always verify at every level.

“Zero Trust Security: An Enterprise Guide”Jason Garbis & Jerry Chapman. Apress, March 2021. ISBN 9781484267011. A vendor-neutral deep dive into Zero Trust for large organizations. Garbis (ex-Appgate) and Chapman (ex-Optiv) lay out the six principles of Zero Trust and offer a structured approach to implement them enterprise-wide. The book covers Zero Trust architectures, identity and microsegmentation strategies, and how to integrate Zero Trust into existing security programs. It also addresses operational aspects like policy administration and monitoring. Value: Highly actionable – includes diagrams, maturity models, and even a companion website with videos. This guide helps security architects map Zero Trust concepts to specific technologies and build a business-aligned Zero Trust roadmap.

“Zero Trust Done Right: A Practitioner’s Guide to Zero Trust Security in the Age of AI” – John Spiegel & Gram Ludlow & Jaye Tillson. 2025. ISBN 9798990483606. A practical guide to implementing Zero Trust using an identity-first approach. Written by a longtime enterprise security practitioner, the book explains why traditional network-centric security models fail in modern cloud and SaaS environments and how organizations can redesign security architectures around identity, strong authentication, and continuous verification. Value: Focuses on real-world implementation rather than theory, providing step-by-step guidance for security teams on how to deploy identity-centric controls, reduce implicit trust, and modernize access models across cloud and on-prem environments. The book helps CISOs and security architects translate Zero Trust principles into operational programs—covering areas like identity governance, authentication, device trust, and policy-based access control.

“Project Zero Trust: A Story About a Strategy for Aligning Security and the Business”George Finney (foreword by John Kindervag). Wiley, 1st ed. October 2022. ISBN 9781119884842. A unique book written as a narrative fable illustrating a CISO’s journey implementing Zero Trust in a company. Finney, a CISO himself, uses storytelling to demonstrate Zero Trust principles in action – from convincing executives, to redesigning networks, to handling incidents. The book interweaves practical lessons (like how to segment crown jewels or deploy MFA) into the storyline. Value: Engaging for both technical and non-technical leaders. It shows how to align Zero Trust with business objectives and culture change, which is invaluable for security leaders seeking organizational buy-in.

“Project Zero Trust: Rise of the Machines”George Finney. (2025). The follow-up or companion to Finney’s first book, possibly exploring broader trends. It likely delves into how Zero Trust fits into the historical evolution of cybersecurity – from early perimeter models to today’s cloud and AI-driven landscape. While detailed info is limited, expect insights on emerging challenges (like integrating AI, supply chain security, etc.) in a Zero Trust context. Value:Provides strategic perspective on why Zero Trust is not just a trend but a paradigm shift in cybersecurity’s ongoing evolution.

“Cybersecurity and Third-Party Risk: Third Party Threat Hunting”Gregory C. Rasner. Wiley, June 2021. ISBN 9781119809555. While focused on third-party risk management, this book strongly advocates Zero Trust approaches for supply chain and vendor access. Rasner covers how to extend Zero Trust principles to third-party connections – e.g., enforcing least privilege for vendors, continuous monitoring of partner access, and verifying devices in contractor networks. The book includes frameworks for assessing third-party security and incident response playbooks. Value: Complements Zero Trust literature by addressing a critical area (supply chain) often exploited in breaches. It’s a go-to reference for implementing Zero Trust controls in vendor and cloud partner scenarios to reduce the risk of supply-chain attacks.

Vendor-Neutral Whitepapers and Reports:

Cloud Security Alliance (CSA) Whitepapers: CSA publishes research like “Zero Trust Guidance for Critical Infrastructure” (2024) and blogs on implementing Zero Trust in cloud environments. These papers provide roadmaps for specific contexts (e.g. Operational Technology or cloud-native apps) using Zero Trust, and are authored by industry experts in the CSA working group.

Analyst Reports (Gartner & Forrester): In addition to books, several influential reports have shaped Zero Trust understanding. Forrester’s 2010 report “No More Chewy Centers: Introducing Zero Trust” by John Kindervag was foundational. More recently, Forrester’s Tech Tide: Zero Trust Threat Prevention (Q4 2022) and Forrester Wave™: Zero Trust Platforms (Q3 2025) evaluate solutions and strategies (authored by analysts like Carlos Rivera and Jess Burn). Gartner has published perspectives on CARTA (Continuous Adaptive Risk and Trust Assessment) and in 2023 introduced a Magic Quadrant for Security Service Edge (covering Zero Trust Network Access). While these reports are often behind paywalls, their key findings (e.g. criteria for Zero Trust vendors, maturity gaps, etc.) are summarized in press releases and webinars. Value: These whitepapers and analyst briefs help practitioners stay current with best practices and vendor offerings, ensuring a “high signal-to-noise” understanding of Zero Trust beyond marketing hype.