Source library · 320 curated entries

Where every claim in SecProve comes from.

A dense reading catalog. Every claim is footnoted. Sort by source, filter by pillar, type, or recency. Built for analysts who want to see what we are standing on.

320SOURCES
143ORGS
50DOMAINS
320ADDED · 90 DAYS
Pillar · multi-selectall 4 selected
Domainsselect pillar(s) above
Browsing the full corpus. Pick pillars above to narrow to specific domains.
5 sources · matching filters · sorted by citation density
Sort
ACybersecurity5 sources
01

Framework for transitioning to zero trust architecture across five pillars: identity, devices, networks, applications, and data.

FrameworkIntermediateA3 · Zero Trust ArchitectureNEW · 1mo ago
Test your knowledge · A3
02

Forrester originated the Zero Trust concept (John Kindervag, 2010). Their extended model includes workloads, data, networks, devices, people, visibility/analytics, automation/orchestration.

ResearchIntermediateA3 · Zero Trust ArchitectureNEW · 22d ago
Test your knowledge · A3
03

The original enterprise ZTA implementation case study. Six published papers covering architecture, migration, and lessons learned. Vendor-specific but pioneered the practical approach to zero trust.

GuideIntermediateA3 · Zero Trust ArchitectureNEW · 22d ago
Test your knowledge · A3
04

Definitive guide to zero trust architecture. Defines ZTA concepts, deployment models, and implementation approaches for enterprise environments.

FrameworkIntermediateA3 · Zero Trust ArchitectureNEW · 1mo ago
Test your knowledge · A3
05

Based on real red/blue team assessments. Includes default configurations, improper privilege separation, lack of network segmentation. Excellent for practical scenario questions.

Test your knowledge · A2

Ready to test what you've learned?

Our questions are built directly from these resources. Take a quiz and see how your knowledge stacks up.