Top
image credit: Pixabay

How the network can support zero trust

August 17, 2020

Simply stated, zero trust calls for verifying every user and device that tries to access the network and enforcing strict access-control and identity management that limits authorized users to accessing only those resources they need to do their jobs.

Zero trust is an architecture, so there are many potential solutions available, but this is a look at those that fit in the realm of networking.

Least privilege

One broad principle of zero trust is least privilege, which is granting individuals access to just enough resources to carry out their jobs and nothing more.

Read More on Networkworld Security