What is zero trust security?
Traditional network security is based on trust and verify principle. If a user or device is inside the network perimeter, it is trusted. But, this approach may prove to be insecure at times. For example, if an attacker manages to gain access to the network, the attacker can access many resources inside the network perimeter. Moreover, traditional network security is not good to prevent insider threats also.
Zero trust security is a security concept as per which every user or device, irrespective of whether the user or device is inside the network perimeter or outside the network perimeter, should be authenticated and authorized before the user or device is permitted to access any resources like an application or data. Moreover, the device should also validate its security configurations continuously in order to maintain access to resources.
In this article, we will discuss:
-
What is zero trust security?
-
The Principles of Zero Trust Security Model
0 Comments