Security News > 2021 > May > Five Practical Steps to Implementing a Zero-Trust Network
With the sprawling, dynamic nature of today's networks, if you don't adopt a Zero-Trust approach, then a breach in one part of the network could quickly cripple your organization as malware, and especially ransomware, makes it way unhindered throughout the network.
So how should organizations go about applying the Zero Trust blueprint to address their new and complex network reality? These five steps represent the most logical way to achieve Zero-Trust networking, by finding out what data is of value, where that data is going and how it's being used.
Humans are often the weakest link and the first source of a breach, so it makes sense to separate these types of network segments from servers in the data center.
Once you know what flows should be allowed, you can move onto designing a network architecture, and a filtering policy that enforces your network's micro-perimeters.
Software-defined networking platforms within data centers and public-cloud providers all allow you to deploy filters within the network fabric - so placing the filtering policies anywhere in your networks is technically possible.
In the discovery's learning phase, you are monitoring the network to learn all the flows that are there and to annotate these with their intent.