processes that extend privileges based on fallible factors such as machine identification using an IP address .
Direct connectivity is a fundamental feature of Zero Trust security . Users connect directly to the application or resource they need to use at that moment . Once the utility is served , the connection is discarded . Each use of the application or resource requires subsequent reconnection and reauthorisation . In this way , connectivity can be considered almost disposable and a means to an end rather than the end itself .
Corporate systems remain obscured
Cybercriminals can only attack what they can see , and , unfortunately , most enterprises still expose IP addresses to the open Internet . However , systems are not visible to the outside world in a Zero Trust environment . This is because Zero Trust mandates insideto-outside connections and blocks outside-to-inside connections . In this way , the attackable threat surface is significantly reduced .
The Internet is the new corporate network
Zero Trust leverages the Internet as a communications backbone . Users connect to applications or resources via the Internet , with cybersecurity delivered immediately at the cloud edge . Zero Trust dissociates connectivity from the physical network , so the Internet replaces the corporate network , thereby reducing corporate reliance on costly LAN and WAN infrastructures .
The attraction of trust
A Zero Trust strategy is appealing for an IT security team battling against a rising tide of attacks . With attackers regularly exploiting trust to gain access to IT infrastructures , minimising this
Zero Trust adopts the philosophy that all data moving across a corporate network should be viewed as being potentially hostile .