Wednesday, April 1, 2020

The foundation of a Zero Trust architecture

Part 1 of a 3 blog series
Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss.  Even the most advanced “next generation” application layer firewalls filtering malicious traffic at the network perimeter has only revealed equal if not greater threats within.  To help counter this internal threat, organizations have invested heavily in internal monitoring and other advanced security controls that inspect traffic at all layers of the OSI stack to identify malicious activity, and stop it before it reaches the destination, or to alert on the activity alone. 
While these initiatives have been helpful, they rely on a connection first being malicious or a trigger on a pre-established set of criteria before any bells and whistles sound or prevention techniques are applied.  By throwing more technology and controls at the problem,…

Derrick Johnson Posted by:

Derrick Johnson

Read full post

      

The post The foundation of a Zero Trust architecture appeared first on Cybersecurity Insiders.


April 01, 2020 at 09:09PM

0 comments:

Post a Comment