You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/includes/2-introduction-zero-trust.md
+7-3Lines changed: 7 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,6 +6,10 @@ Zero Trust is a security strategy. It isn't a product or a service, but an appro
6
6
7
7
Zero Trust is designed to adapt to the complexities of the modern environment. It protects user accounts, devices, applications, and data wherever they're located. A Zero Trust approach should extend throughout your entire organization and serve as an integrated security philosophy and end-to-end strategy.
8
8
9
+
The video that follows describes what Zero Trust is and describes the three guiding principles and the technology pillars.
@@ -16,7 +20,7 @@ Zero Trust is based on three principles:
16
20
17
21

18
22
19
-
## Six technology pillars
23
+
## Technology pillars
20
24
21
25
You implement Zero Trust controls and technologies across six foundational elements. Each element is a source of signal, a control plane for enforcement, and a critical resource to be defended.
22
26
@@ -29,8 +33,8 @@ You implement Zero Trust controls and technologies across six foundational eleme
29
33
|**Infrastructure**| Infrastructure—whether on-premises servers, cloud-based VMs, containers, or microservices—represents a critical threat vector. Assess for version, configuration, and JIT access to harden defense. Use telemetry to detect attacks and anomalies, and automatically block and flag risky behavior. |
30
34
|**Network**| All data is ultimately accessed over network infrastructure. Networking controls can provide critical visibility and help prevent attackers from moving laterally. Segment networks, deploy real-time threat protection, end-to-end encryption, monitoring, and analytics. |
31
35
32
-

36
+
Beyond these six pillars, **visibility, automation, and orchestration** ties them together, and represents the seventh pillar of Zero Trust. With each pillar generating its own signals and alerts, you need an integrated capability to manage the resulting influx of data, better defend against threats, and validate trust in each transaction.
33
37
34
-
Beyond these six pillars, **visibility, automation, and orchestration** ties them together. With each pillar generating its own signals and alerts, you need an integrated capability to manage the resulting influx of data, better defend against threats, and validate trust in each transaction.
38
+

35
39
36
40
Different organizational requirements, existing technology implementations, and security stages all affect how you plan and implement a Zero Trust security model. These principles are usually applied through a series of modernization initiatives or technology-pillar deployment guidance.
0 commit comments