Non-Cyber examples of Zero Trust principles can be an important tool in understanding the concept in Cybersecurity.
I was exercising one weekend while serving on State Active Duty in the Asheville, NC area. Since I wasn’t on duty that day, I was just wearing a pair of basketball shorts and a T shirt.
I made sure I had my Military ID on me, because I figured that a guy in civilian clothes moving around the perimeter of a National Guard facility might look suspicious, and sure enough one of the camp security staff stopped me during my run and asked to see my ID.
While Layered Defense, or Defense in Depth, has traditionally assumed than any device inside the network is trusted implicitly. With zero trust, users must constantly prove they have appropriate permissions, from initial login onward, assuming that all users, devices, and networks are potentially malicious and grants access only on a need-to-know basis.
#cybersecurity
#datasecurity
#ZeroTrust
#NetworkSecurity
Your Trusted Partner To Help Your Business Thrive"SAFe-ly"
7moThat's so awesome Sven! Congratulations, I'm so happy for you!