M05 Case Project 9-6
docx
keyboard_arrow_up
School
ITT Tech *
*We aren’t endorsed by this school
Course
CSIA105
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
1
Uploaded by housermatt87
Matthew Houser
CSIA 105
M05 Case Project 9-6
During his time as a vice president and lead analyst at Forrester Research, John
Rindervag developed Zero Trust after realizing that existing security approaches are built on the
outmoded notion that everything inside an organization's network should be trusted. It is
assumed that a user's identity is not compromised and that all users act responsibly and can be
trusted under this broken trust paradigm. Trust is a weakness, according to the Zero Trust
paradigm. Users - including threat actors and harmful insiders - get access to the network after
they have logged in. So, what is zero trust? Zero Trust is a strategic effort that aims to eliminate
the idea of trust from an organization's network architecture to assist avoid successful data
breaches. The idea of "never trust, always verify" is at the heart of this strategy. By using
network segmentation, limiting lateral movement, enabling Layer 7 threat prevention, and
simplifying granular user-access management, Zero Trust is designed to safeguard modern
digital environments.
One of the main advantages of Zero Trust is Improve Data Protection, Zero Trust
provides superior data security. Rogue workers or viruses cannot acquire access to substantial
sections of your network using a Zero Standing Privilege architecture paired. with just-in-time
(JIT) access. Because malware may quickly find and recover customer data or intellectual
property after breaching your firewall, limiting what a user can. access and for how long helps to
reduce the impact of a breach. On the other hand a The disadvantage is setting up takes time and
effort. Because the network must continue to function during the transition, rearranging policies
inside an existing network might be. tricky. It is often simpler to start again and construct a fresh
network from the ground up. If older machines are unsuitable with the Zero Trust architecture, it
will be essential to start over.
Multifactor authentication, IAM, orchestration, analytics, encryption, scoring, and file
system rights are all used in Zero Trust. Zero Trust also necessitates governance. principles such
as granting users just the level of access required to complete a job. It is. also, a long-term
solution. I believe it is widely accepted because the objective with zero. trust is to be as specific
as possible. Persistent security is required. You should always keep your data safe, both when it's
in transit and when it's in use. Security must be. applied to all file types and applications.
I think zero trust is brilliant because Zero trust assurance is an IT security. philosophy
that requires strict authentication for anyone really attempting to access information on a private
network, even if they are inside the trusted network.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help