Why Zero Trust Should be the Foundation of your Security Architecture

What is Zero Trust?

Even prior to the COVID-19 pandemic, organizations have been through a period of massive digital transformation. Increasingly, work is being done outside of the traditional office which changes the dynamic of security. The edge is no longer simple to define, it is more fluid and follows the users with their multiple devices. ThunderCat and NetApp took a deeper dive on how to build your security architecture in our latest Forrester Research Report.

In response to these needs NIST released Special Publication 800-207, which defines Zero Trust as:

  • Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move network defenses from static, network-based perimeters to focus on users, assets, and resources.
  • A zero-trust architecture (ZTA) uses zero trust principles to plan enterprise infrastructure and workflows. 
  • Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the Internet).
  • Authentication and authorization (both user and device) are discrete functions performed before a session to an enterprise resource is established. 
  • Zero trust is a response to enterprise network trends that include remote users and cloud-based assets that are not located within an enterprise owned network boundary.
  • Zero trust focus on protecting resources, not network segments, as the network location is no longer seen as the prime component to the security posture of the resource.

Zero Trust cannot be treated like a diet, it needs to become habitual. Zero Trust principles must be ingrained in your organization’s IT culture.

Read our full report with NetApp and Forrester Research to learn how you can start the move towards a zero trust architecture.