Zero Trust was created by John Kundera, during his tenure as a vice president and principal analyst for Forrester Research, it was not created this year or last year or even three years ago by XYZ company.
It is based on the realization that traditional security models operate on the outdated assumption that everything inside an organization’s network should be trusted. Under this broken trust model, it is assumed that a user’s identity is not compromised and that all users act responsibly and can be trusted.
The Zero Trust model recognizes that trust is a vulnerability. Once on the network, users – including threat actors and malicious insiders – are free to move laterally and access or exfiltrate whatever data they are not limited to. Remember, the point of infiltration of an attack is often not the target location.
Achieving Zero Trust is often perceived as costly and complex. However, Zero Trust is built upon your existing architecture and does not require you to rip and replace existing technology. There are no Zero Trust products. There are products that work well in Zero Trust environments and those that don’t.
Zero Trust is also quite simple to deploy, implement and maintain using a simple five-step methodology. This guided process helps Identify where you are and where to go next: Windgate Group can share these policy steps with you.