Zero Trust Step 2: Map the Transaction Flows
Find Threat Talks on
Zero Trust Step 2: Map the transaction flows
Why You Need to Understand Data Flows
Once you have defined a few protect surfaces (see: Step 1 of Zero Trust), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another.
Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them.
In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation.
They explore:
✅ How to identify communication paths
⛕The difference between inbound and outbound traffic (and why this matters)
🙋🏼♂️Why business owners and business context are essential
Get all the details and insights on this second step of Zero Trust: mapping the transaction flows.
Additional Resources:
Your cybersecurity experts
Lieuwe Jan Koning
Co-Founder and CTO
ON2IT
Episode details
Zero Trust Step 2: Map the Transaction Flows
In this episode of Threat Talks, host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas explore the second step of Zero Trust: mapping the transaction flows.
After identifying your protect surfaces, the next step is understanding how these surfaces communicate. Mapping these flows provides insight into how data moves through your environment and helps you assess which systems could be affected in the event of an incident.
Rob highlights how this process helps you uncover actual dependencies, understand application behavior, and improve alignment between IT and the business. The transaction flow matrix you build now can also serve as a tool later in your Zero Trust journey, allowing you to compare expected versus actual traffic and validate that your policies are being enforced as intended.
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
