Friday, November 22, 2024

Federal News Network: Why zero trust architecture should be the new cybersecurity standard

Recently, the concept of zero trust architecture as a cybersecurity practice has come into sharp focus following President Joe Biden’s executive order for all arms of the federal government to begin adopting and implementing zero trust policies.

This federal mandate set the precedent for government entities and private organizations alike to begin taking the concept of zero trust seriously. But what is zero trust, and how is it different from the cybersecurity measures already in place for most organizations? Simply put, zero trust architecture is a security method that requires all users of a given network to be continuously authenticated, validated and authorized in order to access that network’s data and tools. No devices or users are automatically trusted to gain access to the network, hence the name “zero trust.”…

There are four key concepts that I like to highlight whenever I’m discussing zero trust:

  • Assume the network is hostile;
  • know that your environment contains active threats;
  • always authenticate and authorize every user, device, and network flow; and finally
  • ensure that network policies are dynamic and calculated from multiple telemetry sources… Read the full article here.

[related-post]

LEAVE A REPLY

Please enter your comment!
Please enter your name here

FedHealthIT Xtra – Find Out More!

Recent News

Don’t Miss A Thing

Jackie Gilbert
Jackie Gilbert
Jackie Gilbert is a Content Analyst for FedHealthIT and Author of 'Anything but COVID-19' on the Daily Take Newsletter for G2Xchange Health and FedCiv.

Subscribe to our mailing list

* indicates required