Zero Trust Model Guidance The National Security Agency (NSA) has released Cybersecurity Information Sheet: Embracing a Zero Trust Security Model, which provides information about, and recommendations for implementing Zero Trust…
The NSA guidance explains, “The Zero-Trust security model assumes that a breach is inevitable or has likely already occurred, so it constantly limits access to only what is needed and looks for anomalous or malicious activity.” Governments have been using this “need to know” paradigm since time immemorial when dealing with state secrets; though, given the number of insider threat cases being prosecuted that involve government insiders, one is right to question the efficacy/implementation of a “need to know.”
A few thoughts on the state of security on the Edge after reading the blog post by Frank Ohlhorst on March 2, 2021
Zero Trust Network Access is a step in the right direction in building out a Trust Architecture, It’s not complete without risks when not implemented properly. This is the end of the VPN. It’s about time.
After Target was a victim of a supply chain attack, through one of their contractors, organizations should have immediately taken steps to prepare for what is understood to be a…