Security News > 2021 > September > The Gap in Your Zero Trust Implementation
A zero trust security model is based on the idea that no IT resource should be trusted implicitly.
Prior to the introduction of zero trust security, a user who authenticated into a network was trustworthy for the duration of their session, as was the user's device.
First, zero trust security often means operating in a vastly different manner than what IT and the organization's users are used to.
Another thing that makes zero trust security difficult to implement is that zero trust might best be thought of as a state that organizations aspire to achieve.
While it is sometimes tempting to think of the zero trust model as being user-centric, zero trust really means making sure that all actions can be validated and that no actions can be performed without the proper validation.
Specops Secure Service Desk can help to eliminate these types of security risks, which is in keeping with zero trust security principles.
News URL
http://feedproxy.google.com/~r/TheHackersNews/~3/TD8dPwSf7Ds/the-gap-in-your-zero-trust.html