The zero trust approach to enterprise security proposed by analyst firm Forrester Research nearly a decade ago can be challenging to implement. You need a clear understanding of the changes it entails and the impact it can have on the user experience.
The model emphasizes robust user authentication and device validation over network and endpoint security as key to protecting applications and data against new and emergent threats. Instead of having enforcement mechanisms at the network perimeter, zero trust focuses on moving them as close as possible to the actual application or surface that needs to be protected. Users and devices are not automatically trusted simply because they happen to be behind the enterprise perimeter or on a trusted network.
Leave a reply