What do you think of when you hear the word “security”? If you are anything like most people, the answer would come down to something that approximates: keeping threats and danger away, outside of your zone of highest vulnerability. There is notion of a border. But the traditional perimeter is no more…
Why do you need a Zero Trust approach?
In the modern workplace, the borders between work, home or anywhere else outside the office have faded. We jump from one device to the other and chances are we use all of them for at least some form of collaboration: e-mail communication, filesharing, logging on to work apps, accounts and cloud environments… You catch our drift.
We are vulnerable in many more places than before. Identities, devices, apps, networks, infrastructure, and data: they are all potential entry points for attackers. This new reality requires a Zero Trust approach.
What are the Zero Trust principles?
Standards and guidance for Zero Trust are developed by the National Institute of Standards and Technology (NIST). NIST has defined Zero Trust in terms of several basic tenets: