My personal notes
T

Zero Trust security model

Zero Trust is a security model that assumes the worst-case scenario and protects resources with that expectation. Zero Trust assumes breach at the outset and then verifies each request as though it originated from an uncontrolled network.

Three principles:

  • Verify explicitly: Always authenticate and authorize based on all available data points.
  • Follow [[principle-of-least-privilege]]: Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.
  • Assume breach: Minimize blast radius and segment access. Verify end-to-end encryption. Use analytics to get visibility, drive threat detection, and improve defences.

While on older approaches, a device was considered secure when it was connected to a corporate network, the Zero Trust security model grants access to a user based on authenticated requests rather than the connection type.

Show Graph Visualisation