Resources
Papers
This paper describes why cyber defense automation is needed, challenges to automating cyber defense, and strategies for overcoming these challenges.
This paper describes a heterogeneous vendor implementation of a Zero Trust Architecture and explains it's operation.