From the course: Understanding Zero Trust
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Zero Trust data
From the course: Understanding Zero Trust
Zero Trust data
- [Instructor] An advanced concept in zero trust is the ability for data to protect itself. This idea originated in the early work done by the Jericho project in which the ninth of 12 commandments states, "Access to data should be controlled "by security attributes of the data itself." The Jericho commandment suggests that to achieve this attributes can be held within the data itself as it is in a digital rights system for documents or it can be in a separate access management system. Inherent protection of data could be implemented by encryption, although some data may have public non-confidential attributes and need no confidentiality protection. Furthermore, access and access rights to data may change over time. Some zero trust vendors take a network centric security approach using micro-segmentation to provide fine-grained access based on network path. However, this doesn't stop an authorized user who can gain access to a…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
What is Zero Trust?3m 40s
-
(Locked)
The principles of Zero Trust7m 19s
-
(Locked)
ACT-IAC and the six pillars of zero trust5m 1s
-
(Locked)
Zero trust across the digital estate6m 47s
-
(Locked)
Policy-based admission control2m 46s
-
(Locked)
Zero Trust and the business context4m 9s
-
(Locked)
Zero Trust data2m 44s
-
(Locked)
An extended approach to Zero Trust5m 13s
-
(Locked)
-
-