Zero Trust Security Model
Rethink Your Approach to Enterprise Security
As traditional network perimeters dissolve, security professionals must discard the old model of “trust but verify”, which relied on well-defined boundaries. Instead, strengthen security levels by implementing a “always verify” approach for everything — including users, endpoints, networks, servers and applications.
Rethink your security by always first verifying identity and endpoint health, then use policies to govern access and privilege to corporate resources.
Verify the User
Never Trust, Always Verify
Confirm Jane’s identity by asking her to provide something she has, something she knows or something she is. Also leverage user behavior unique to Jane and context such as location, day and time of login as additional factors to ensure authenticity.
Verify Their Device
Make sure Jane is using a trusted endpoint before granting access to resources. If Jane logs into a resource from an untrusted endpoint, challenge Jane with MFA or block her access if the resource should only be accessible from a secure trusted endpoint.
Limit Access & Privilege
Just Enough Access
Once Jane has confirmed her identity and is using a trusted endpoint at a verified location, Jane is then granted just enough access she needs to perform her job at any given time.
Learn & Adapt
Continuously leverage data about Jane, her device(s) and her behavior to allow access, block access or enforce additional authentication. With machine learning, policies can be adjusted automatically and in real-time.
Why Zero Trust?
A Zero Trust approach to security assumes that everything is untrusted and must always be verified to decrease the chance of a major breach. The notion of a robust perimeter no longer exists and thus, by combining identity assurance, and endpoint posture to grant access through a least privilege model, lateral movement, phishing attacks, and other common attack vectors are eliminated.