Part 5 of the Zero Trust Daily Series
The three major ingredients of Zero Trust differ from our present model. The NIST Cyber Security Framework calls for Identify (assets and threats) Protect (technical, physical or process defence) Detect, Respond and Recover. Identifying assets and threats are equally important considerations of zero trust but establishing the Identity and authority of a device or person requesting access is paramount to zero trust. Identity is key – 81% OF DATA BREACHES INVOLVE STOLEN OR WEAK CREDENTIALS, AND 91% OF PHISHING ATTACKS TARGET USER CREDENTIALS SO SIMPLE SSO IS A BONUS. Monitoring Access is also key but for ZTA this is more to refine policy which regulates access than response. Our Security Operations Centre employment of SIEM (pronounced SIM) or SOAR is about response and investigation of incidents. With a properly tuned Zero Trust Architecture there should be no incidents.