Briefly describe the main components of the Zero Trust Model/Zero Trust Architecture:
How does this model/architecture relate to Perimeter Security?
Do traditional security technologies like Firewalls or VPNs still play a role in this
model/architecture?
Why or why not?
Filtering in traditional perimeters is based on the IP addresses or ports of network traffic – what
is filtering based on in Zero Trust Model/Zero Trust Architecture?
How does the principal of Least Privilege guide the application of the Zero Trust Model/Zero
Trust Architecture?
Resources:
https://resources.infosecinstitute.com/zero-trust-security-what-is-it/
https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture
https://www.oreilly.com/library/view/zero-trust-networks/9781491962183/ch01.html
https://www.forbes.com/sites/insights-vmwaresecurity/2019/06/12/zero-trust-the-modern-approach-
to-cybersecurity/#7b4b24f24e9d