From the course: Understanding Zero Trust

Unlock the full course today

Join today to access over 24,700 courses taught by industry experts.

Zero Trust data

Zero Trust data

- [Instructor] An advanced concept in zero trust is the ability for data to protect itself. This idea originated in the early work done by the Jericho project in which the ninth of 12 commandments states, "Access to data should be controlled "by security attributes of the data itself." The Jericho commandment suggests that to achieve this attributes can be held within the data itself as it is in a digital rights system for documents or it can be in a separate access management system. Inherent protection of data could be implemented by encryption, although some data may have public non-confidential attributes and need no confidentiality protection. Furthermore, access and access rights to data may change over time. Some zero trust vendors take a network centric security approach using micro-segmentation to provide fine-grained access based on network path. However, this doesn't stop an authorized user who can gain access to a…

Contents