Five guidelines for implementing the zero-trust model:
- The zero-trust system relies on network users to never trust any user, device or application and to always verify authenticity.
- Users should assume that the adversary already has a presence in the network.
- Apply security policies across all domains (mobile, LAN, WAN, etc.).
- Embrace multi-factor authentication for users to make stealing credentials more difficult.
- Incorporate zero-trust architecture incrementally in a strategic plan to avoid increased vulnerabilities during the transition.
To see the full list of guidelines, click here.
More articles on cybersecurity:
North Dakota hospital informs 1,500 patients of data breach
More than 350K health records breached in February
Hackers infiltrate Oxford University’s biochemical systems, COVID-19 research