The Zero Trust Model of information security
simplifies how information security is conceptualized by assuming there are no longer “trusted” interfaces, applications, traffic, networks, or users. It takes the old model— “trust but verify”—and inverts it because recent breaches have proven that when an organisation trusts, it doesn’t verify. The zero-trust model of information security means “verify and never trust.”
I found this fascinating as this is not my area of expertise. When you think about it, the approach makes perfect sense.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.