What is Zero Trust?




You may have seen a lot of buzz lately about a term Zero Trust. So, that is all the hype about, and why should you care?

Some have taken a stance around zero trust as a product, but it is more of a strategy. A strategy mostly taken by IT of not trusting devices and users that are not on the same network. For example, network administrators would take the stance of trusting devices that are on the same subnet, or network. Devices had control to keep the bad actors on the outside and good people on the inside. But in today’s internet-driven economy, and an always-on IT environment, the challenge of deciding who or what is good and bad is more difficult.

The idea of zero trust is now about users proving they are who they say they are. Often this requires biometric authentication, like Face ID on your iPhone, or using some other authentication method only known to you, thus trusting no one.

Image by FLY:D on Unsplash



Comments

Popular posts from this blog

Compilation of Hyper-V related PowerShell script

The Technical Benefits of a DRaaS Solution

Strengthening Security: Why Companies Need a Secure Infrastructure