Founder & CEO

Sakshyam Shah

Founder & CEO

Posted on: Sun Jan 20 2019


Sign up to our newsletter.

Get the latest articles on all things security delivered straight to your inbox.

Loading...

Quick intro to zero trust

Learn zero trust in 5 minute

Quick intro to zero trust


Zero-trust is a security paradigm that promotes "blocking by default, security control based on risk, minimizing blast radius." As simple as it sounds, it essentially means,

  1. Security policies should be blocking by default. Everything must be re-verified.
  2. Risk-based access control.
  3. Micro network segmentation, so that one compromised network does not let the attacker or malware pivot to all connected network.

Security policies should be blocking by default. Everything must be re-verified.

Cybersecurity has historically modeled around the perimeter of trust. Trusted Users, trusted user devices, and trusted network segments are three fundamental entities that are considered safe and trustable.

Risk-based access control.

Username and password combination is a universal authentication method. There is no problem with this but instead is not adequate in verifying the authenticity of access.

Micro network segmentation and sandboxes.

Despite implementing 100% security controls, let's say an attacker still manages to find a way to compromise an account, a server, or a network segment. What now? Zero-trust ensures that the compromise of one entity or element does not mean the end of the world.

Which zero trust solutions should I buy?

Internet is full of buzzwords, and if you are following security trends for a while, "zero trust" probably comes first. If you were not skimming this post, you probably have figured out already that there is no "one-stop solution" to achieve zero-trust.