What is Zero Trust?
Zero trust security is an IT security model
that requires strict identity verification for
every person and device trying to access
resources on a private network, regardless
of whether they are sitting within or outside
of the network perimeter. No single specific
technology is associated with zero trust
architecture; it is a holistic approach to
network security that incorporates several
different principles and technologies.
Traditional IT network security is based on
the castle-and-moat concept. In castle-and-
moat security, it is hard to obtain access
from outside the network, but everyone
inside the network is trusted by default. The
problem with this approach is that once an
attacker gains access to the network, they
have free reign over everything inside.
Zero trust is based
on four principles
Least-privilege access with all
entities (users, devices, and
workloads) being authenticated
before granting access and
continually re-authenticated and
re-authorized based on context.
Microsegmentation at the
application level without network
segmentation.
Applications and network remain
invisible to the open internet.
The internet becomes the new
transport network via encrypted
microtunnels