Zero Trust Step 2: Map the Transaction Flows

One year of Hackers Roadmaps

Find Threat Talks on

Zero Trust Step 2: Map the transaction flows

Why You Need to Understand Data Flows

Once you have defined a few protect surfaces (see: Step 1 of Zero Trust), the next step is to start mapping the transaction flows: how these protect surfaces communicate with one another.

Understanding how data travels to, from and around protect surfaces is your next logical movie. Why? Because if you don’t know how your systems talk to each other, you can’t secure them.

In this episode of Threat Talks, host Lieuwe Jan Koning and Field CTO Rob Maas discuss how to identify communication paths between protect surfaces and why this visibility is critical for both risk containment and policy validation.

They explore:

✅ How to identify communication paths
⛕The difference between inbound and outbound traffic (and why this matters)
🙋🏼‍♂️Why business owners and business context are essential

Get all the details and insights on this second step of Zero Trust: mapping the transaction flows.

Additional Resources:

Zero Trust Step One 

Your cybersecurity experts

Lieuwe Jan Koning

Co-Founder and CTO
ON2IT

Rob Maas, Field CTO, ON2IT

Rob Maas

Field CTO
ON2IT

Episode details

Zero Trust Step 2: Map the Transaction Flows

In this episode of Threat Talks, host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas explore the second step of Zero Trust: mapping the transaction flows.

After identifying your protect surfaces, the next step is understanding how these surfaces communicate. Mapping these flows provides insight into how data moves through your environment and helps you assess which systems could be affected in the event of an incident.

Rob highlights how this process helps you uncover actual dependencies, understand application behavior, and improve alignment between IT and the business. The transaction flow matrix you build now can also serve as a tool later in your Zero Trust journey, allowing you to compare expected versus actual traffic and validate that your policies are being enforced as intended.

One year of Hackers Roadmaps

Get your Hacker T-shirt

Join the treasure hunt!

Find the code within this episode and receive your own hacker t-shirt for free.

15 + 4 =

Christmas Hacker