Security News > 2020 > January > A Practical Guide to Zero-Trust Security

A Practical Guide to Zero-Trust Security
2020-01-15 21:17

Perhaps the most notable of the emerging security models is zero trust.

"Zero trust" is a phrase first coined by John Kindervag of Forrester in 2010 to describe the need to move security leaders away from a failed perimeter-centric approach and guide them to a model that relies on continuous verification of trust across every device, user and application.

This all makes sense in theory, but what does implementing zero trust look like in practical terms? When talking to customers about steps they can take to build a zero-trust security architecture, I focus on five main pillars - device trust, user trust, transport/session trust, application trust and data trust.

Device Trust: For zero trust, as an IT administrator, you need to know your devices before you can trust them.

Application Trust: Enabling employees to securely and seamlessly access any application, including traditional Windows applications, from any device is key to creating a digital workspace and enforcing zero trust.


News URL

https://threatpost.com/practical-guide-zero-trust-security/151912/