The term Zero Trust is ubiquitous in the security industry, leaving many to believe it is merely a marketing term. Jasson Casey, our CTO, dissects the key concepts of Zero Trust using the NIST framework and the essential role that strong authentication plays in a Zero Trust world.
The first thing that we really want to focus on is what is our definition of zero trust? We're going to actually just borrow the definition that comes out of NIST. NIST has a document called 800-207.
And in there they actually call out a couple of motivating problems, really setting up the stage for what is zero trust trying to solve. The preview really is, assume you're operating in a hostile environment, and kind of establish trust as you need to with respect to what someone's actually trying to do.
But more specifically, one of the first problems they actually talk about is that there is no implicit trust based on any sort of special location in the network.
Follow Beyond Identity:
twitter.com/beyondidentity
linkedin.com/company/beyond-identity-inc
Website:
beyondidentity.com