CISO Tradecraft® artwork

#20 - Zero Trust

CISO Tradecraft®

English - March 12, 2021 12:30 - 45 minutes - 62.1 MB - ★★★★★ - 46 ratings
Technology Homepage Download Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed


Would you actually like to learn about what Zero Trust is without a bunch of marketing jargon?  On this week's episode G Mark Hardy and Ross Young provide a thoughtful discussion on Zero Trust from NIST and Microsoft:


Microsoft's Zero Trust Principles
Verify Explicitly
Use Least Privileged Access
Assume Breach

NIST 800-207 Seven Tenets of Zero Trust
All data sources and computing services are considered resources
All communication is secured regardless of network location
Access to individual enterprise resources is granted on a per-session basis
Access to resources is determined by dynamic policy
The enterprise monitors and measures the integrity and security posture of all owned and associated assets
All resource authentication and authorization are dynamic and strictly enforced before access is allowed
The enterprise collects as much information as possible about the current state of assets, network infrastructure, and communication and uses it to improve its security posture

Six Foundational Elements of Zero Trust
Identities
Devices
Applications
Data
Infrastructure
Networks