Intelligent CISO Issue 34 | Page 42

Moving towards a ZT architecture is not a quick end goal , but rather a journey for most organisations .
EXPERT OPINION schemes were being rapidly deployed by bad actors to take advantage of unsuspecting users and thinly stretched IT and InfoSec teams .
In the face of this , the move towards a Zero Trust ( ZT ) architecture takes increasing importance . The basic premise of Zero Trust is to eliminate implicit trust associated with locality of access and move the emphasis towards protecting assets , not network segments – assets being users , devices and applications . In other words , Zero Trust assumes there is no implicit trust granted to assets solely based on their physical or network location .
The four key principles encompassing Zero Trust are :
1 . Identifying all assets and their access / communication patterns
2 . Authentication , authorisation and access control of all assets
3 . Encrypting all data flows regardless of network location
Moving towards a ZT architecture is not a quick end goal , but rather a journey for most organisations .
42 www . intelligentciso . com