Security News > 2021 > March > 5 tips for implementing a zero trust model
One option that is often touted is a zero trust model through which access to critical resources is scaled back and granted only under specific conditions.
Sponsored by CyberArk, "The CISO View 2021 Survey: Zero Trust and Privileged Access report" collected the advice based on interviews with 12 top security executives from Global 1000 companies.
In a zero trust model, most user access to applications is protected with such controls as MFA and adaptive authentication.
PAM systems should be used to protect all high-level, administrative access for individuals and accounts, such as an IT admin or a process with administrative access to infrastructure.
For all valuable resources, minimize the number of accounts, users with access to accounts, and their privileges.
Just-in-time access can temporarily give users elevated privileges to install software such as a printer driver.
News URL
https://www.techrepublic.com/article/5-tips-for-implementing-a-zero-trust-model/#ftag=RSS56d97e7