Zero Trust Cyber Security Model
Zero Trust Cyber Security Model
Zero Trust Cyber Security Model
MODEL
Learning Outcomes
Having completed this module, you will be able to:
Describe different variations and scenarios concerned with Zero Trust deployment.
Paraphrase the core principles, basic beliefs, and core pillars of the Zero Trust framework.
Discuss why the Zero Trust model must be implemented as a cybersecurity framework.
Relate the NIST 800-207 standard with the establishment of a Zero Trust network.
Indicate how the Zero Trust model can be exploited with insider attacks.
Security management.
Access control.
Buried sensors.
Video analytics.
Face sensors.
Apart from these measures, several physical security measures, such as barriers, lighting, gates, and fences,
are also deployed to protect assets. Regarding cybersecurity measures, organizations implement Intrusion
Prevention Systems and firewalls to protect against malicious activities. But lately, the IT environment's
increased complexities and rapidly changing dynamics are rendering perimeter security measures weak.
Changed Security Dynamics in the Cybersecurity
As we all know, the Covid-19 pandemic has greatly changed the dynamics of every department of life.
Work practices were also greatly influenced by the pandemic, and there were times when almost everyone
was forced to work from their homes. This situation meant that the employees must access their
organization's IT frameworks from unauthorized locations and devices, including their own personal
devices.
Using such unsecured locations and devices was making the companies' networks vulnerable with every
passing day. This situation led most of them to use a Virtual Private Network (VPN). While VPN did
provide them with an encrypted communication channel, they still have their own caveats.
With solutions like VPN being ineffective, it is important to learn about more robust frameworks and
cybersecurity solutions, such as Zero Trust.
Gateway-Based Deployment
This approach does not need the client devices to be controlled by the
organization. In this approach, the controls are applied at a gateway level
where PEP ensures compliance with requirements and restrictions. Resource
Portal-Based deployment is usually associated with BYOD, because the client
device is not directly controlled by the organization.
This approach does not need the client devices to be controlled by the
organization. In this approach, the controls are applied at a gateway level
where PEP ensures compliance with requirements and restrictions. Resource
Portal-Based deployment is usually associated with BYOD, because the client
device is not directly controlled by the organization.