Zero Trust Architecture (ZTA) incorporates many aspects of effective cyber security…but not all of them. There are many elements of information security that are implied in ZTA but are not explicitly stated. These include role-based access control (RBAC), identity management, key management and threat intelligence. Together, constitute the zero trust environment, which must be in place for the architecture to be implemented. ZTA plus these environmental elements are the basis for secure use of information resources, today and as a foundation for future growth. This session presents each of these elements as products to be evaluated, acquired and implemented in order to achieve full zero trust.
Learning objectives:
- The various security methods that support ZTA but are not included in it.
- The value proposition for a fully supported zero trust environment.
- The vendor landscape of these supportive methods.
- Determining the need for supplemental products and tools.