Zero Trust Architecture

Zero trust architecture is a cybersecurity framework that assumes all network traffic, users, devices, and workloads are potentially malicious until proven otherwise. The key principles of zero trust include:

  • No implicit trust - Verify every user, device, and network flow explicitly before granting the least privileged access. Do not assume that anything already within the network perimeter is trusted.

  • • Identity-centric - Authenticate and authorize every access request by users, devices, and other entities. Strong identity systems and multi-factor authentication are essential.

  • Microsegmentation - Segment access granularly and enforce on a one-to-one level. Restrict lateral movement across networks.

  • Continuous security - Monitor and log all access and activity. Use analytics to detect threats and anomalies in real-time. Regularly reevaluate trust levels.

  • Assume breach - Adopt a mindset that breaches will occur. Use multilayered controls and security in-depth to reduce the blast radius of breaches.

The goal is to minimize access and blast radius for bad actors while providing smooth access to users with proper identity verification. Zero trust principles can apply to on-prem, cloud, and hybrid environments. Implementing zero trust requires significant resources and may impact user experience if not well-executed.

zta.png

Embracing Zero Trust Series

  • Zero Trust Principles - In this episode Darren explores the principles of Zero Trust architecture with special guest David Marcus, Senior Security Architect, and returning guest Dr. Anna Scott.
  • Zero Trust Architecture - In this episode Darren interviews Steve Orrin and David Marcus on the key elements of Zero Trust Architecture.
  • Zero Trust Applications - In this episode Darren interviews Patrick Conte from Fortanix about leveraging confidential computing in securiting applications in zero trust architectures.
  • Zero Trust Operational Technology - In this episode Darren interviews the CEO of Founder of Veridify Louis Parks. They discuss the unique problems with Operational technology networks that control critical infrastructure, due to legacy complexity, accessibility vulnerabilities, and lack of visibility.

Episodes

175 - Zero Trust with Operational Technology
In this episode Darren interviews the CEO of Founder of Veridify Louis Parks. They discuss the unique problems with Operational technology networks that control critical infrastructure, due to legacy complexity, accessibility vulnerabilities, and lack of visibility.

174 - Zero Trust Application with Confidential Computing
In this episode Darren interviews Patrick Conte from Fortanix about leveraging confidential computing in securiting applications in zero trust architectures.

172 - Zero Trust Architecture
In this podcast episode Darren talks with Steve Orrin and Dave Marcus and discusses zero trust architecture, a new security model needed for today's digital environments where the network perimeter is disappearing. Experts explain what zero trust is, key principles like default deny access and continuous authentication, and advice for organizations starting their zero trust journey.

170 - Zero Trust Principles
In this episode Darren explores the principles of Zero Trust architecture with special guest David Marcus, Senior Security Architect, and returning guest Dr. Anna Scott

115 - Blocking and Tackling of Security
In this episode, Darren talks about cybersecurity with returning guest John Evans, Chief Technology Advisor at World Wide Technology (WWT).

88 - Collaborative DevSecOps
On this episode, Darren talks with Sophos’ Callen Sapien, Director of Product Management, Sophos Factory, and Mike Fraser, VP of DevSecOps about their product that allows for truly collaborative SecDevOps.

36 - Six Pillars of Cybersecurity
With cyber-attacks on the rise in all industries, security is more important than ever. In this episode, Darren Pulsipher, Chief Solution Architect, and Steve Orrin, Federal CTO at Intel Federal, outline the attack vectors, the six pillars of cybersecurity, and how Intel can help. The level of complexity organizations must deal with to secure their data, systems, and applications has never been more difficult.