Security News > 2021 > October > Analyzing and implementing a national zero trust architecture

Analyzing and implementing a national zero trust architecture
2021-10-18 06:00

These basic practices are just a small part of the larger zero trust security model, which is based on the concept such of "Never trust, always verify," multi-factor authentication, least privileged access, and micro-segmentation.

The zero trust security model has been around for over a decade, but did not reach widespread adoption until recently.

As today's perimeter-based cybersecurity solutions continue to fail and produce news reports about high-profile data breaches and ransomware attacks, zero trust security continues to gain traction.

The recent release of the Office of Management and Budget's Federal Zero Trust Strategy, CISA's Zero Trust Maturity Model, and Cloud Security Technical Reference Architecture documents represent a major step toward improving the U.S. government's cyber defense capabilities.

Overcoming national zero trust concerns and obstacles.

As individuals, organizations, and now federal agencies acknowledge Cybersecurity Awareness Month, implementing zero trust will certainly be a top priority not only this October, but every month and day following.


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/aNU_zBedpOI/