SlideShare a Scribd company logo
ZERO TOLERANCE
ZERO TRUST ARCHITECTURE
Tuğçe ARSLAN
The Zero Trust Architecture (ZTA) has made
a lot of noise in the cybersecurity world, primar-
ily due to a recent issue. In that order, the Zero
Trust Architecture (ZTA) is cited as one of the best
practices for modernizing Federal Government
cybersecurity.
It is a method of designing the cybersecurity
infrastructure of an organization’s network based
on the Zero Trust Architecture (ZTA) Model. At its
core, Zero Trust Architecture (ZTA) operates on
the principle that there is no implicit trust given
to any part of a network. The Zero Trust Architec-
ture (ZTA) Model was developed to reduce the
potential attack threat and increase the security
posture.
Network security generally deals with ac-
cess. Gaining access to a resource requires users
to prove their identity by showing their creden-
tials, thereby achieving the network’s trust. The
traditional “fort and moat” approach to security
relies on establishing perimeter defenses where
these credentials are checked and access is
allowed once verified. However, this practice
poses potential security threats.
In the Zero Trust Architecture (ZTA) Model,
every network request should be treated as if
the network had been compromised, and even
simple requests should be treated as a potential
threat. As a result, multi–factor authentication
and authorization are required before a session
can be started or any access allowed. Also,
when an authenticated user requests access to
a new resource, their credentials need to be
rechecked. This approach helps limit lateral
movement when there is a threat inside the net-
work and helps to quickly detect, identify and
neutralize threats coming from the outside or
inside the network.
The total transformation of an organiza-
tion’s IT systems to implement a Zero Trust
Architecture (ZTA) is complex. Instead, organi-
zations should continually improve their security
posture in small and simple steps. Also, migrat-
ing existing services to the new architecture is
often more costly than designing new services
from scratch. Therefore, it may be an excellent
strategy to implement new services, especially
cloud-based ones, by Zero Trust Architecture
(ZTA) principles.
anumak.ai
Zero Trust Architecture (ZTA) is a data–cen-
tric approach because it focuses on protecting
the network’s assets rather than its segments. A
critical factor for implementing Zero Trust Archi-
tecture (ZTA) should be to identify the resources
that need protection and the best method to
protect them. Data must be protected at rest
and in transit, so encryption, especially PKI, is
the cornerstone of Zero Trust Architecture (ZTA)
implementation. Data collection on the efficien-
cy of the policies implemented and user behav-
ior is also critical in creating a dynamic system
that can adapt to cybersecurity’s ever–changing
environment.
As the Zero Trust Architecture (ZTA) devel-
ops and matures rapidly, the concept of Zero
Trust Architecture (ZTA) is explained in different
dimensions for different situations. However,
based on the Zero Trust Architecture (ZTA)
approach;
•	 Network locality is not sufficient to decide
trust in a network.
•	 External and internal threats are always
present on the network.
•	 Every device, user, and network flow must
be authenticated and authorized.
•	 Policies should be dynamic and calculated
from as many data sources as possible.
Integration of IoT devices into IT networks is
quite common nowadays. However, this inte-
gration of IoT devices comes with its own set
of problems. These devices are not recognized
with high–security standards, thus putting the
entire network at risk of unauthorized breach.
To get it, Zero Trust Architecture (ZTA) is a
policy implemented to counter this new vulnera-
bility.
Design Principles of Zero Trust
Architecture (ZTA)
•	 Know your architecture, including users,
devices, and data:
In other cases, you can identify your pur-
chases by following a non–technical procedure
such as querying procurement records.
It is also essential to know what data is
stored in your environment, its location, and its
sensitivity.
•	 Evaluate user behavior, service, and device
health:
•	 Focus on monitoring users, devices, and
services:
In a Zero Trust Architecture (ZTA), your mon-
itoring strategy will likely change to focus on
users, devices, and services. Monitoring your
devices, services, and user behavior will help
you build your cyber health.
anumak.ai
Tracking must be done on the device and exported via a secure transfer (to a central loca-
tion). User behavior, such as regular working hours or standard working location, is another
critical metric to monitor. It is also essential to have visibility of your services and services. Un-
derstand the interaction between users and their data. This information can be used as a signal
with any observed abnormal activity operated by a policy engine to make an access decision.
You should know what devices, users, and services perform and their access data. Your
monitoring should go back to the policies you set and verify that they are implemented as you
expect.
•	 Do not trust any network, including your own:
Please do not trust any network between the device and its accessing service, including the
local network. Communication over a network to access data or services must use a secure
transport such as TLS. In addition, the device must be configured to prevent attacks existing on
a local web.
•	 Know your user, service, and device IDs:
An identity can represent a user (human), service (software process), or device. Each must
be uniquely identifiable in Zero Trust Architecture (ZTA). This is one of the most critical factors in
deciding whether to grant someone or something access to data or services.
These unique IDs are a series of signals that feed a policy engine that uses this information
to make access decisions.
Completing a discovery exercise is an essential first step towards allocating a single identity
resource to your users, services, and devices.
•	 Authenticate and authorize everyone:
When assessing the risk associated with access requests.
MFA is a requirement for Zero Trust Architecture (ZTA).
This does not mean that the user experience has to be poor. On the contrary, powerful MFA
can be achieved with a good user experience on modern devices and platforms.
•	 Use policies to authorize requests:
Policies can also help facilitate risk–managed to share of data or services with guest users
or partner organizations.
Use product–managed services and protocols that support a continuous authentication and
authorization process.
anumak.ai
ANUMAK & COMPANY
aNumak & Company is a global management consulting firm, an India private company
limited by warranty. It is a company with expertise in creating scalable business models for
different industry verticals. The Company strives to provide solutions through consulting, digital
transformation, and innovative products that solve modern business problems. Offering on–
site and offshore support and unique strategies, aNumak & Company transforms traditional
business models into high–performance, dynamic, and distinctive business enterprises.
It brings insights from core domain experts to deliver the best possible solutions to drive
growth. aNumak & Company and each of its member firms are legally separate and
independent entities. For more detailed information about aNumak & Company and its
member companies, please visit https://www.anumak.com
This material was prepared by aNumak & Company. This material (including any information
it contains) is intended to provide general information on a particular topic(s). This material
may contain information obtained from publicly available information or other third–party
sources. aNumak & Company does not independently verify such sources and is not
responsible for any loss resulting from reliance on information obtained from such sources.
aNumak & Company does not provide any investment, legal, or other professional advice or
services through this material. You should seek specific advice from the relevant
specialist(s) for such services. This material or information is not intended to be considered
the sole basis for any decision that could affect you, your business, or the operations of the
company. Before making any decision or taking any action that could affect your finances or
business, you should consult a professional.
No institution at aNumak & Company can be held responsible for any loss suffered by any
person or institution due to access to, use, or reliance on this material. By using this material or
any information it contains, the user accepts he entirety of this notice and the terms of use.
©2022 aNumak & Company
anumak.ai
CONTACTS
Amith Kumar
Chief Executive Officer,
aNumak & Company
amith@anumak.com
Neha Anush
Chief Operating Officer,
aNumak & Company
neha.anush@anumak.com
Cesibel Rodriguez
Chief Branding Officer,
aNumak & Company
cesi@anumak.com
Ricky Devaya
Chief Human Resource Officer – India,
aNumak & Company
ricky@anumak.com
Vilas Khole
Chief Delivery Officer – India,
aNumak & Company
vilas@anumak.com
Karthik Reddy
Chief Sales Officer – UAE,
aNumak & Company
karthik@anumak.in
Iván Muñiz Rothgiesser
Sales Director,
aNumak & Company
ivan@anumak.com
aNumak & Company
marketing@anumak.com
Pr@anumak.in - info@anumak.com
CONTRIBUTORS
Gino Mori Valenzuela
Client Partner – Retail,
aNumak & Company
gino@anumak.in
Diana Marcela Rios
Client Partner – Retail,
aNumak & Company
diana@anumak.in
Víctor Freundt
Client Partner – Education,
aNumak & Company
victor@anumak.in
Agyemang Mensah Kwadwo
Graphic Designer,
aNumak & Company
agyemang@anumak.in
Author: Tuǧçe ARSLAN
arslan@anumak.in
anumak.ai

More Related Content

PDF
Zero Trust Architecture - Allendevaux.pdf
PDF
What Is Zero Trust Architecture and Why Do You Need It.pdf
PPTX
COSAC 2021 presentation - AWS Zero Trust
PPTX
Zero Trust Architecture Zero Trust ArchitectureZero Trust ArchitectureZero Tr...
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PPTX
What is zero trust model (ztm)
PPTX
Zero Trust: Redefining Security in the Digital Age
PPTX
ZERO-TRUST ARCHITECHTURE IN CYBER SECURITY
Zero Trust Architecture - Allendevaux.pdf
What Is Zero Trust Architecture and Why Do You Need It.pdf
COSAC 2021 presentation - AWS Zero Trust
Zero Trust Architecture Zero Trust ArchitectureZero Trust ArchitectureZero Tr...
microsoft-cybersecurity-reference-architectures (1).pptx
What is zero trust model (ztm)
Zero Trust: Redefining Security in the Digital Age
ZERO-TRUST ARCHITECHTURE IN CYBER SECURITY

Similar to Zero Tolerance Zero Trust Architecture (20)

PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PDF
Understanding the Zero Trust Architecture Market: A Comprehensive Overview
PDF
SAP Application Access with Instasafe Zero Trust
PDF
Nitel USA_ Enhancing Data Security with Zero Trust Network Access.pdf
PDF
Zero Trust Network Security- A Modern Approach to Cyber Defense (1).pdf
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PDF
The Zero Trust Security Model for Modern Businesses!
PPTX
The Importance of Zero Trust Security in Modern.pptx
PDF
Fortifying Cybersecurity_ The Imperative of Zero Trust Network Access
PDF
Zero trust in a hybrid architecture
PPTX
Zero Trust and Data Security
PDF
Fortinet ZTNA - Um contexto de sua Implementação
PDF
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
PPTX
architectures trim.pptx
PDF
Zero Trust Networks Evan Gilman Doug Barth
PDF
Zero Trust Networks Evan Gilman Doug Barth
PDF
Zero Trust Model Presentation
PPTX
zerotrustmodelpresentation-200107094517.pptx
PPTX
The Open Group - ZT Commandments and Reference Model.pptx
PPTX
Zero Trust 20211105
BATbern48_How Zero Trust can help your organisation keep safe.pdf
Understanding the Zero Trust Architecture Market: A Comprehensive Overview
SAP Application Access with Instasafe Zero Trust
Nitel USA_ Enhancing Data Security with Zero Trust Network Access.pdf
Zero Trust Network Security- A Modern Approach to Cyber Defense (1).pdf
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
The Zero Trust Security Model for Modern Businesses!
The Importance of Zero Trust Security in Modern.pptx
Fortifying Cybersecurity_ The Imperative of Zero Trust Network Access
Zero trust in a hybrid architecture
Zero Trust and Data Security
Fortinet ZTNA - Um contexto de sua Implementação
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
architectures trim.pptx
Zero Trust Networks Evan Gilman Doug Barth
Zero Trust Networks Evan Gilman Doug Barth
Zero Trust Model Presentation
zerotrustmodelpresentation-200107094517.pptx
The Open Group - ZT Commandments and Reference Model.pptx
Zero Trust 20211105
Ad

More from aNumak & Company (20)

PDF
The Challenges Of Multi-cloud Management.pdf
PDF
5 Pillars Of Effective Data Management In Modern Data Systems.pdf
PDF
How CFOs Are Helping Corporations Integrate ESG Into Their Business Strategie...
PDF
Impact Of Industry 4.0 Technologies On Business Development And Management.pdf
PDF
The Future Of Smart Technology And Its Effect On Business performance.pdf
PDF
The effects of Industry 5.pdf
PDF
Importance Of The Dignity Of Compliance Risk In Organizations.pdf
PDF
NEXT GENERATION SOFTWARE DEVELOPMENT.pdf
PDF
Getting Through the Fear Factor When Hiring Tech Talents.pdf
PDF
Rebuilding social capital and improving business performance.pdf
PDF
How Advanced Connectivity__ affects the prospects of the market trends today.pdf
PDF
How Praise And recognition affect bottom line.pdf
PDF
DANGERS OF TOXIC WORKPLACE.pdf
PDF
How To Build Mentally Resilience Workforce for An Organization.pdf
PDF
FUTURE OF RETAIL WILL LOOK LIKE WHAT'S HAPPENED IN THE MUSIC INDUSTRY.pdf
PDF
Localization of data privacy laws creates opportunities for competition.pdf
PDF
How a Revamped Data Analytics Approach Can Mitigate Healthcare Disparities.pdf
PDF
Effects of High Inflation on Private Equity Performance in Business.pdf
PDF
How Low-code Can Help Businesses Automate IoT In Their Business.pdf
PDF
How the CEO's visionary leadership can tip the scales in favor of success in ...
The Challenges Of Multi-cloud Management.pdf
5 Pillars Of Effective Data Management In Modern Data Systems.pdf
How CFOs Are Helping Corporations Integrate ESG Into Their Business Strategie...
Impact Of Industry 4.0 Technologies On Business Development And Management.pdf
The Future Of Smart Technology And Its Effect On Business performance.pdf
The effects of Industry 5.pdf
Importance Of The Dignity Of Compliance Risk In Organizations.pdf
NEXT GENERATION SOFTWARE DEVELOPMENT.pdf
Getting Through the Fear Factor When Hiring Tech Talents.pdf
Rebuilding social capital and improving business performance.pdf
How Advanced Connectivity__ affects the prospects of the market trends today.pdf
How Praise And recognition affect bottom line.pdf
DANGERS OF TOXIC WORKPLACE.pdf
How To Build Mentally Resilience Workforce for An Organization.pdf
FUTURE OF RETAIL WILL LOOK LIKE WHAT'S HAPPENED IN THE MUSIC INDUSTRY.pdf
Localization of data privacy laws creates opportunities for competition.pdf
How a Revamped Data Analytics Approach Can Mitigate Healthcare Disparities.pdf
Effects of High Inflation on Private Equity Performance in Business.pdf
How Low-code Can Help Businesses Automate IoT In Their Business.pdf
How the CEO's visionary leadership can tip the scales in favor of success in ...
Ad

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Machine Learning_overview_presentation.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Mushroom cultivation and it's methods.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
1. Introduction to Computer Programming.pptx
PPT
Teaching material agriculture food technology
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
Network Security Unit 5.pdf for BCA BBA.
TLE Review Electricity (Electricity).pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
cloud_computing_Infrastucture_as_cloud_p
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Machine Learning_overview_presentation.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Mushroom cultivation and it's methods.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
1. Introduction to Computer Programming.pptx
Teaching material agriculture food technology
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Spectral efficient network and resource selection model in 5G networks
Programs and apps: productivity, graphics, security and other tools
Group 1 Presentation -Planning and Decision Making .pptx

Zero Tolerance Zero Trust Architecture

  • 1. ZERO TOLERANCE ZERO TRUST ARCHITECTURE Tuğçe ARSLAN
  • 2. The Zero Trust Architecture (ZTA) has made a lot of noise in the cybersecurity world, primar- ily due to a recent issue. In that order, the Zero Trust Architecture (ZTA) is cited as one of the best practices for modernizing Federal Government cybersecurity. It is a method of designing the cybersecurity infrastructure of an organization’s network based on the Zero Trust Architecture (ZTA) Model. At its core, Zero Trust Architecture (ZTA) operates on the principle that there is no implicit trust given to any part of a network. The Zero Trust Architec- ture (ZTA) Model was developed to reduce the potential attack threat and increase the security posture. Network security generally deals with ac- cess. Gaining access to a resource requires users to prove their identity by showing their creden- tials, thereby achieving the network’s trust. The traditional “fort and moat” approach to security relies on establishing perimeter defenses where these credentials are checked and access is allowed once verified. However, this practice poses potential security threats. In the Zero Trust Architecture (ZTA) Model, every network request should be treated as if the network had been compromised, and even simple requests should be treated as a potential threat. As a result, multi–factor authentication and authorization are required before a session can be started or any access allowed. Also, when an authenticated user requests access to a new resource, their credentials need to be rechecked. This approach helps limit lateral movement when there is a threat inside the net- work and helps to quickly detect, identify and neutralize threats coming from the outside or inside the network. The total transformation of an organiza- tion’s IT systems to implement a Zero Trust Architecture (ZTA) is complex. Instead, organi- zations should continually improve their security posture in small and simple steps. Also, migrat- ing existing services to the new architecture is often more costly than designing new services from scratch. Therefore, it may be an excellent strategy to implement new services, especially cloud-based ones, by Zero Trust Architecture (ZTA) principles. anumak.ai
  • 3. Zero Trust Architecture (ZTA) is a data–cen- tric approach because it focuses on protecting the network’s assets rather than its segments. A critical factor for implementing Zero Trust Archi- tecture (ZTA) should be to identify the resources that need protection and the best method to protect them. Data must be protected at rest and in transit, so encryption, especially PKI, is the cornerstone of Zero Trust Architecture (ZTA) implementation. Data collection on the efficien- cy of the policies implemented and user behav- ior is also critical in creating a dynamic system that can adapt to cybersecurity’s ever–changing environment. As the Zero Trust Architecture (ZTA) devel- ops and matures rapidly, the concept of Zero Trust Architecture (ZTA) is explained in different dimensions for different situations. However, based on the Zero Trust Architecture (ZTA) approach; • Network locality is not sufficient to decide trust in a network. • External and internal threats are always present on the network. • Every device, user, and network flow must be authenticated and authorized. • Policies should be dynamic and calculated from as many data sources as possible. Integration of IoT devices into IT networks is quite common nowadays. However, this inte- gration of IoT devices comes with its own set of problems. These devices are not recognized with high–security standards, thus putting the entire network at risk of unauthorized breach. To get it, Zero Trust Architecture (ZTA) is a policy implemented to counter this new vulnera- bility. Design Principles of Zero Trust Architecture (ZTA) • Know your architecture, including users, devices, and data: In other cases, you can identify your pur- chases by following a non–technical procedure such as querying procurement records. It is also essential to know what data is stored in your environment, its location, and its sensitivity. • Evaluate user behavior, service, and device health: • Focus on monitoring users, devices, and services: In a Zero Trust Architecture (ZTA), your mon- itoring strategy will likely change to focus on users, devices, and services. Monitoring your devices, services, and user behavior will help you build your cyber health. anumak.ai
  • 4. Tracking must be done on the device and exported via a secure transfer (to a central loca- tion). User behavior, such as regular working hours or standard working location, is another critical metric to monitor. It is also essential to have visibility of your services and services. Un- derstand the interaction between users and their data. This information can be used as a signal with any observed abnormal activity operated by a policy engine to make an access decision. You should know what devices, users, and services perform and their access data. Your monitoring should go back to the policies you set and verify that they are implemented as you expect. • Do not trust any network, including your own: Please do not trust any network between the device and its accessing service, including the local network. Communication over a network to access data or services must use a secure transport such as TLS. In addition, the device must be configured to prevent attacks existing on a local web. • Know your user, service, and device IDs: An identity can represent a user (human), service (software process), or device. Each must be uniquely identifiable in Zero Trust Architecture (ZTA). This is one of the most critical factors in deciding whether to grant someone or something access to data or services. These unique IDs are a series of signals that feed a policy engine that uses this information to make access decisions. Completing a discovery exercise is an essential first step towards allocating a single identity resource to your users, services, and devices. • Authenticate and authorize everyone: When assessing the risk associated with access requests. MFA is a requirement for Zero Trust Architecture (ZTA). This does not mean that the user experience has to be poor. On the contrary, powerful MFA can be achieved with a good user experience on modern devices and platforms. • Use policies to authorize requests: Policies can also help facilitate risk–managed to share of data or services with guest users or partner organizations. Use product–managed services and protocols that support a continuous authentication and authorization process. anumak.ai
  • 5. ANUMAK & COMPANY aNumak & Company is a global management consulting firm, an India private company limited by warranty. It is a company with expertise in creating scalable business models for different industry verticals. The Company strives to provide solutions through consulting, digital transformation, and innovative products that solve modern business problems. Offering on– site and offshore support and unique strategies, aNumak & Company transforms traditional business models into high–performance, dynamic, and distinctive business enterprises. It brings insights from core domain experts to deliver the best possible solutions to drive growth. aNumak & Company and each of its member firms are legally separate and independent entities. For more detailed information about aNumak & Company and its member companies, please visit https://www.anumak.com This material was prepared by aNumak & Company. This material (including any information it contains) is intended to provide general information on a particular topic(s). This material may contain information obtained from publicly available information or other third–party sources. aNumak & Company does not independently verify such sources and is not responsible for any loss resulting from reliance on information obtained from such sources. aNumak & Company does not provide any investment, legal, or other professional advice or services through this material. You should seek specific advice from the relevant specialist(s) for such services. This material or information is not intended to be considered the sole basis for any decision that could affect you, your business, or the operations of the company. Before making any decision or taking any action that could affect your finances or business, you should consult a professional. No institution at aNumak & Company can be held responsible for any loss suffered by any person or institution due to access to, use, or reliance on this material. By using this material or any information it contains, the user accepts he entirety of this notice and the terms of use. ©2022 aNumak & Company anumak.ai
  • 6. CONTACTS Amith Kumar Chief Executive Officer, aNumak & Company amith@anumak.com Neha Anush Chief Operating Officer, aNumak & Company neha.anush@anumak.com Cesibel Rodriguez Chief Branding Officer, aNumak & Company cesi@anumak.com Ricky Devaya Chief Human Resource Officer – India, aNumak & Company ricky@anumak.com Vilas Khole Chief Delivery Officer – India, aNumak & Company vilas@anumak.com Karthik Reddy Chief Sales Officer – UAE, aNumak & Company karthik@anumak.in Iván Muñiz Rothgiesser Sales Director, aNumak & Company ivan@anumak.com aNumak & Company marketing@anumak.com Pr@anumak.in - info@anumak.com CONTRIBUTORS Gino Mori Valenzuela Client Partner – Retail, aNumak & Company gino@anumak.in Diana Marcela Rios Client Partner – Retail, aNumak & Company diana@anumak.in Víctor Freundt Client Partner – Education, aNumak & Company victor@anumak.in Agyemang Mensah Kwadwo Graphic Designer, aNumak & Company agyemang@anumak.in Author: Tuǧçe ARSLAN arslan@anumak.in anumak.ai