From the course: Understanding Zero Trust

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

The principles of Zero Trust

The principles of Zero Trust

- NIST provides seven tenants of zero trust in its special publication 800-207. And these are the set of principles or beliefs that a generally held to be true with respect to zero trust. All data sources and computing services are considered resources. This means that all devices which connect either directly from inside the organization or remotely such as personal laptop, or mobile phones are in scope. In addition, applications which make machine to machine requests are also in scope. All communication is secured regardless of network location. In simple terms, this means that we don't differentiate the internal networks from internet access. And all are required to protect the data being carried. Access to individual enterprise resources is granted on a per session basis. This is a key principle which means any prior access does not imply that access will be automatically granted. Every access request has to be…

Contents