Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.
10 Ways to Avoid Zero-Trust Failure10 Ways to Avoid Zero-Trust Failure
Here are the prerequisites to have in order before getting past the zero-trust gate.
September 20, 2021
Dark ReadingExpert Collage
As cybercriminals run roughshod over enterprise environments using tried-and-true methods of credential theft, privilege escalation, and lateral movement across networks to find the high-value targets, zero-trust security principles look better by the day. Zero trust assumes no user is trusted and every point of access requires authorization. Zero trust takes the principle of least privilege to the next level by continuously validating users, devices, and services and only giving minimal access to what they need at any given time based on the risk profile of whatever it is they are touching.
It sounds simple, but it is exceedingly complex to pull off successfully. The good news is that there is a growing body of security professionals who have learned hard lessons on the do's and don’ts of zero-trust implementations. Here’s what they say newbies need to know before they even get out of the gate in order to avoid failure or delays in their transition to zero trust.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023