Zero Trust
Appearance
Zero Trust (ZT) is a set of cybersecurity paradigms that focuses on users, assets, and resources instead of static perimeters. Zero trust is a response to trends such as including remote users, bringing one's own device, and cloud-based assets not within an enterprise-owned network boundary. The network location is no longer the prime component of a resource's security.[1]
Principles
- Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location or asset ownership.
- Zero trust focuses on protecting resources (assets, services, workflows, and network accounts), not network segments.
Zero Trust Architecture
Zero Trust Architecture (ZTA) uses zero trust principles to guide industrial and enterprise infrastructure and workflow. Authentication and authorization are discrete functions performed before a session to an enterprise resource is established.