Zero Trust Networking
pexels-photo-3894157

Zero Trust Networking

The massive increase in mobile devices connecting to corporate resources in recent years pushed multifactor authentication system (phone-based challenge) in addition to VPN technology. The Zero Trust (ZT) networking trend accelerated with the adoption of mobile and cloud technologies. In ZT networking, to enhance security, users are verified every time they request access, even if they were authenticated earlier.

Some of the Principles of Zero trust (ZT) are.

  • least privilege principles consistently across the organization

  • Grant resource access per session basis, instead of 24/7 access.

  • Follow Identity Life cycle.

  1. Joiner – Role based Access

  2. Mover – Add Access, Remove Access

  3. Leavers – Limit or Remove Access

  • Step-up authentication (knowledge-based authentication).

  • Deployment of biometric authentication

  • Shifting access controls from network perimeter to individual users

  • Device health policies for personal devices to access corporate network.

Zero trust network Eco system is evolving, and many new practices are getting added which will significantly improve the user experiences.

Anindita Kumar

Solutions Architect (Cloud & IoT) at Atos

8mo

Ready to excel in your GIAC certification journey? 🏆 Discover www.edusum.com/giac for top-tier practice exams. 🚀 #GIAC #CertificationExcellence #Edusum #CareerAdvancement

Like
Reply

To view or add a comment, sign in

Insights from the community

Others also viewed

Explore topics