Home
EN
Location
Documentation Home
Palo Alto Networks
Support
Live Community
Knowledge Base
MENU
Home
Best Practices
Zero Trust Best Practices
Best Practices Implementing Zero Trust with Palo Alto Networks
Version 9.0 (EoL)
Download PDF
Last Updated:
May 16, 2022
Current Version:
9.0 (EoL)
Version 10.1
Version 10.0
Version 9.1
Version 9.0 (EoL)
Table of Contents
Search the Table of Contents
copyright
Zero Trust Best Practices
What Is Zero Trust and Why Do I Need It?
Zero Trust Viewpoint
Zero Trust High-Level Best Practices
How Do I Start My Zero Trust Implementation?
The Five-Step Methodology
Step 1: Define Your Protect Surface
Step 2: Map the Protect Surface Transaction Flows
Step 3: Architect a Zero Trust Network
Step 4: Create the Zero Trust Policy
Step 5: Monitor and Maintain the Network
Zero Trust Resources
copyright
Zero Trust Best Practices
What Is Zero Trust and Why Do I Need It?
Zero Trust Viewpoint
Zero Trust High-Level Best Practices
How Do I Start My Zero Trust Implementation?
The Five-Step Methodology
Step 1: Define Your Protect Surface
Step 2: Map the Protect Surface Transaction Flows
Step 3: Architect a Zero Trust Network
Step 4: Create the Zero Trust Policy
Step 5: Monitor and Maintain the Network
Zero Trust Resources
End-of-Life (EoL)
Recommended Topics
What Is Zero Trust and Why Do I Need It?
What Is Zero Trust?
The Five-Step Methodology
Five Steps