Zero trust and your network: act as though you’ve been hacked!
Zero trust is far from easy to define, let alone implement. NIST (the US National Institute of Standards and Technology) refers to accurate, per-request access decisions, based on the idea that your network has been compromised. The main concept is ‘never trust, always verify’. Every request to connect is verified, taking into account attributes such as identity, location and device, following the principle of least privilege access and only to explicitly authorised resources.
Presentations from the X-change of 3 May 2023.
03 / 05 / 23
As a concept, therefore, Zero Trust is clear, but what does it actually mean for the people that simply want to work, and the machines and devices attempting to do what they are programmed to do? As all interactions – whether benevolent or malicious – go over networks, let’s take that point of view to focus on zero trust network architecture.
In this session, we first heard from Verizon about zero trust network architecture. Then, Carrefour shared their real-life use case with the Google zero trust architecture.
Presentations and a recording of the event are available for our members below (after login)
- Verizon presentation: Zero trust network architecture – the ‘What, How and Why’?
- Carrefour user story: BeyondCorp zero trust success story – Google and Carrefour