ZERO TRUST NETWORK
ZERO TRUST NETWORK
The traditional approach by trusting users and devices within a notional "corporate
perimeter" or via a VPN connection is commonly not sufficient in the complex
environment of a corporate network. The zero trust approach advocates mutual
authentication, including checking the identity and integrity of users and devices
without respect to location, and providing access to applications and services based
on the confidence of user and device identity and device status in combination with
user authentication.[1] The zero trust architecture has been proposed for use in
specific areas such as supply chains.[2][3]
The principles of zero trust can be applied to data access, and to the management of
data. This brings about zero trust data security where every request to access the
data needs to be authenticated dynamically and ensure least privileged access to
resources. In order to determine if access can be granted, policies can be applied
based on the attributes of the data, who the user is, and the type of environment
using Attribute-Based Access Control (ABAC). This zero-trust data security approach
can protect access to the data.[4]