Why Zero Trust Should be the Foundation of your Security Architecture
What is Zero Trust?
In response to these needs NIST released Special Publication 800-207, which defines Zero Trust as:
- Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move network defenses from static, network-based perimeters to focus on users, assets, and resources.
- A zero-trust architecture (ZTA) uses zero trust principles to plan enterprise infrastructure and workflows.
- Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the Internet).
- Authentication and authorization (both user and device) are discrete functions performed before a session to an enterprise resource is established.
- Zero trust is a response to enterprise network trends that include remote users and cloud-based assets that are not located within an enterprise owned network boundary.
- Zero trust focus on protecting resources, not network segments, as the network location is no longer seen as the prime component to the security posture of the resource.