Exabeam
flow-image

Keys to the Kingdom: Guidance for Effective Zero Trust Architecture

Published by Exabeam

Zero trust is not a technology, but rather a model that seeks a shift in approach, first coined by Forrester Research. He asserted that the typical defense-in-depth approach was flawed due to the inherent-trust model, and instead recommended a new model that “allows us to build security into the DNA of the network itself.” Essentially, in the zero-trust model, all traffic is deemed hostile.

Forrester suggested five concepts to make Zero Trust Architecture actionable:

  1.  All resources must be accessed in a secure manner.
  2. Access control is on a need-to-know basis.
  3. Do not trust people; verify what they are doing.
  4. Inspect all log traffic coming in on the network for malicious activity.
  5. Design networks from the inside out.

These five concepts were just the beginning; this initial thinking evolved significantly with contributions by governing bodies, such as NIST, CISA, and DISA, which we will incorporate later in this paper.

Download Now

box-icon-download

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.

Related Categories Server, Applications, Virtual private network (VPN), Server, Cloud Computing, Network, Software, Bring Your Own Device (BYOD), VPN, Enterprise Resource Planning, Log Management, Malware, Analytics, Machine Learning, Bring Your Own Device (BYOD), Compliance, Bring Your Own Device (BYOD), Analytics and Information Management (AIM), Private Networks, Workflow, Server, Software