Zero trust is not a new concept in cybersecurity, having become popular as an alternative to traditional perimeter-based network security. The idea behind zero trust is exactly as it sounds: to create a line of defense based on limiting the amount of power any one user has through reducing their access privileges – their “trust” in the system.
The thinking behind zero trust comes from the reality that protecting an organization’s data, assets and workloads has become increasingly complex. Not only have cyber attacks grown in sophistication over the years, but the variety and quantity of infrastructure that organizations have to defend has grown markedly. Today, an organization could have several internal networks, remote individuals, or remote offices with their own local infrastructure and cloud services.
Read the complete article here