Zero Trust: Getting the basics right | SC Media
Zero trust

Zero Trust: Getting the basics right

November 8, 2021
  • Reduced attack surface: Ports, workloads and applications are invisible unless authenticated and authorized to access.
  • Identity verification: Access permissions are conditional and based on user context such as role, date, time, location, and device posture.
  • Dynamically adjusted entitlements: As context surrounding the identity changes in real time, so can the user’s entitlements.
  • Preventing lateral movement: Surgical micro-segmentation eliminates visibility and access to unauthorized resources.
  • Securing east-west traffic: Control bi-directional connections between resources on the network.
  • Ransomware
  • Distributed Denial of Service (DDoS) attacks
  • Insider threats
  • Man-in-the-Middle (MITM) attacks
  • Design flaws that create vulnerabilities in an application or gaps within a set of security solutions
  • Implementation mistakes, like misconfigurations or patching oversights
  • Operational errors, like clicking on a phishing email
  • A user is denied access to networks and digital assets by default
  • Identity is subject to an extensive authentication process that considers the user, device and context.
  • Dynamic policies and entitlements are then granted to the identity, provisioning limited access to authorized resources.
  • These surgical entitlements are conditional and based on context and risk tolerance defined by your organization.
prestitial ad