From the course: Understanding Zero Trust
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
The principles of Zero Trust
From the course: Understanding Zero Trust
The principles of Zero Trust
- NIST provides seven tenants of zero trust in its special publication 800-207. And these are the set of principles or beliefs that a generally held to be true with respect to zero trust. All data sources and computing services are considered resources. This means that all devices which connect either directly from inside the organization or remotely such as personal laptop, or mobile phones are in scope. In addition, applications which make machine to machine requests are also in scope. All communication is secured regardless of network location. In simple terms, this means that we don't differentiate the internal networks from internet access. And all are required to protect the data being carried. Access to individual enterprise resources is granted on a per session basis. This is a key principle which means any prior access does not imply that access will be automatically granted. Every access request has to be…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
What is Zero Trust?3m 40s
-
(Locked)
The principles of Zero Trust7m 19s
-
(Locked)
ACT-IAC and the six pillars of zero trust5m 1s
-
(Locked)
Zero trust across the digital estate6m 47s
-
(Locked)
Policy-based admission control2m 46s
-
(Locked)
Zero Trust and the business context4m 9s
-
(Locked)
Zero Trust data2m 44s
-
(Locked)
An extended approach to Zero Trust5m 13s
-
(Locked)
-
-