Security News > 2021 > March > 5 tips for implementing a zero trust model

5 tips for implementing a zero trust model
2021-03-25 13:55

One option that is often touted is a zero trust model through which access to critical resources is scaled back and granted only under specific conditions.

Sponsored by CyberArk, "The CISO View 2021 Survey: Zero Trust and Privileged Access report" collected the advice based on interviews with 12 top security executives from Global 1000 companies.

In a zero trust model, most user access to applications is protected with such controls as MFA and adaptive authentication.

PAM systems should be used to protect all high-level, administrative access for individuals and accounts, such as an IT admin or a process with administrative access to infrastructure.

For all valuable resources, minimize the number of accounts, users with access to accounts, and their privileges.

Just-in-time access can temporarily give users elevated privileges to install software such as a printer driver.


News URL

https://www.techrepublic.com/article/5-tips-for-implementing-a-zero-trust-model/#ftag=RSS56d97e7