Zero Trust was first introduced going into the 2010s with the rise of cloud infrastructures and remote work. In 2022, it is a commonly used industry term – but can be confusing due to misconceptions and productization. The Zero Trust conversation may still be foreign to many businesses who are seeking simplicity and cost-effective solutions to drive their decisions.
What is Zero Trust and Why is it needed?
The fundamental premise of Zero Trust is that security is transaction-based and continually evaluated. Security cannot be implied by the physical location of a resource (e.g. a computer is inside a network boundary, so it is implicitly trusted) nor is security a static, check once – grant indefinitely process. This change in approach to security is necessitated by the proliferation of cloud-based resources outside of a network boundary, remote/work from anywhere users, IoT, OT and BYOD endpoints, and the assumption that known/controlled resources within an organization may be compromised.
The NIST Publication 800-207 outlines the seven tenants to a ZT Architecture and goes on to say, “Transitioning to a ZTA is a journey that organizations should seek to incrementally build upon by leveraging elements of a ZTA they already have in their environment today.” They go on to state, “most enterprise infrastructures will operate in a hybrid Zero Trust/Legacy mode during this time while continuing to invest in ongoing IT modernization initiatives and improving organization business processes.” The following represents a “summary” of these tenants:
Four Common Misconceptions about Zero Trust
Zero Trust means “trust nothing and verify everything”. It is a journey that gradually reduces the attack surface with the goal of eliminating it all together. Learn more about how Three Wire provides a policy engine, administration, and enforcement capability that can be leveraged as an organization builds out its Zero Trust solution.