Our Zero Trust Cheat Sheet: A Recipe Against Losing Control
Zero Trust is neither a product nor a service or a technology: It’s a philosophy that governs how all products, services, and technologies are set up in the first place and configured to communicate with each other. Based on the ‘Guilty until proven innocent’ principle, Zero Trust ensures that even company-owned laptops, smartphones, apps, services, and users are considered ‘safe’ only when they’ve clearly authenticated themselves as such. The three core princples are:
- Zero Trust Workforce: Ensures clear security guidelines for all your employees working inside your network as well as remotely. It also covers guests, such as contractors and customers.
- Zero Trust Workload: As apps and services have increasingly become targets for attacks, Zero Trust needs tob e extended to cover applications or services, including your software and hardware resources, the hybrid coud, LoB applications and virtual desktops.
- Zero Trust Workplace: Ensures a secure connection between your IT endpoints, servers, IoT devices and IoCs (Industry Control Systems) among each other as well as your employees’ access to these areas.