Wednesday, May 6, 2020

Word of the Day: zero trust

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | May 6, 2020

zero trust

Zero trust is a cybersecurity strategy that assumes all users, devices and transactions are already compromised.

 

The zero trust model requires strict identity and device verification, regardless of the user's location in relation to the network perimeter. A network that implements the zero trust model is referred to as a zero trust network.

 

The traditional approach to network security is known as the castle-and-moat model. The focus of this concept is that gaining access to a network from the outside is difficult, but once inside the firewall, users are automatically trusted.

While there are various technologies and principles that can be used to enforce zero trust security, the basic fundamentals include the following:

  • Microsegmentation -- Security perimeters and network components are broken into smaller segments, each of which has its own access requirements.
  • Least-privileged access -- Users are only granted access to what they need to do their job effectively.
  • Risk management analytics -- All network traffic is logged and inspected for suspicious activity. Continue reading...

Today's Takeaway

 

"Zero trust is not a single product, nor is it a single approach or technique. It is a mindset, a decision. It is an organization saying, 'Network security is a priority' and then putting its resources behind that statement." - Jack Burbank

Buzzword Alert

 

ATT&CK
The Mitre ATT&CK framework will help you earn who will be coming after you, based on your business, and how they will do it.

 

Spring Security

AJava developers require a comprehensive understanding of the Spring Security architecture's capabilities and implementation.

 

Office 365

IT pros should not assume that Microsoft has embedded security effectively and appropriately in its suite of cloud services.

 

user behavior analytics (UBA)

To improve cybersecurity for remote workstaff, companies are tapping into user behavior analytics and exploiting features built into data loss prevention software.

Do You Speak Security?

 
If you answer nine of 10 threat intelligence questions correctly, you'll not only be up to date on the latest cybersecurity issues -- you'll receive CPE credit as well.
Take the quiz

Stay in Touch

 

Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: