M05 Case Project 9-6

docx

School

ITT Tech *

*We aren’t endorsed by this school

Course

CSIA105

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

1

Uploaded by housermatt87

Report
Matthew Houser CSIA 105 M05 Case Project 9-6 During his time as a vice president and lead analyst at Forrester Research, John Rindervag developed Zero Trust after realizing that existing security approaches are built on the outmoded notion that everything inside an organization's network should be trusted. It is assumed that a user's identity is not compromised and that all users act responsibly and can be trusted under this broken trust paradigm. Trust is a weakness, according to the Zero Trust paradigm. Users - including threat actors and harmful insiders - get access to the network after they have logged in. So, what is zero trust? Zero Trust is a strategic effort that aims to eliminate the idea of trust from an organization's network architecture to assist avoid successful data breaches. The idea of "never trust, always verify" is at the heart of this strategy. By using network segmentation, limiting lateral movement, enabling Layer 7 threat prevention, and simplifying granular user-access management, Zero Trust is designed to safeguard modern digital environments. One of the main advantages of Zero Trust is Improve Data Protection, Zero Trust provides superior data security. Rogue workers or viruses cannot acquire access to substantial sections of your network using a Zero Standing Privilege architecture paired. with just-in-time (JIT) access. Because malware may quickly find and recover customer data or intellectual property after breaching your firewall, limiting what a user can. access and for how long helps to reduce the impact of a breach. On the other hand a The disadvantage is setting up takes time and effort. Because the network must continue to function during the transition, rearranging policies inside an existing network might be. tricky. It is often simpler to start again and construct a fresh network from the ground up. If older machines are unsuitable with the Zero Trust architecture, it will be essential to start over. Multifactor authentication, IAM, orchestration, analytics, encryption, scoring, and file system rights are all used in Zero Trust. Zero Trust also necessitates governance. principles such as granting users just the level of access required to complete a job. It is. also, a long-term solution. I believe it is widely accepted because the objective with zero. trust is to be as specific as possible. Persistent security is required. You should always keep your data safe, both when it's in transit and when it's in use. Security must be. applied to all file types and applications. I think zero trust is brilliant because Zero trust assurance is an IT security. philosophy that requires strict authentication for anyone really attempting to access information on a private network, even if they are inside the trusted network.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help