Ideas from books, articles & podcasts.
It's normal to start risk assessment with attack surface analysis. For example, security professionals look at where the perimeter is, how someone might break in and what method they might use.
With Zero Trust, it is different. The highest value and highest risk users and assets
You can't protect what you can't see. First complete visibility to understand how everything connects and behaves, which is the cause of security gaps or broken workflows.
Once they get complete visibility, they can understand what trust and enforcement policies the...
Data centres traditionally manage networks and surrounding environments by creating a "micro-boundary" in the data centre with a differential segment, meaning only pre-approved traffic flows can pass.
When building a Zero Trust Architecture, the principle is the same, but the network
Identity is the foundation of Zero Trust security. It means knowing where all identities originate: user identities, service accounts, application sessions, ephemeral identities, and cloud assets.
Identity-based Zero Trust continually monitors every access request made by all users to any r...
Remote workers accessing your network increase the attack surfaces on a new scale. The security team should find ways to reduce the attack surface to minimize exposure.
Internally, a micro-segmentation approach gives a secure 1:1 connection to authorized resources.
We can also app...
created 7 ideas
created 15 ideas
Nowadays it is important to be aware of this kind of thing, So just Trying to add Value...
created 5 ideas
❤️ Brainstash Inc.