Solving Security
Zero Trust Model
Verify the User
Multi-Factor Authentication
– Username
– Password
– Code or Approval
Validate the device
– Verify that the device is known
– Verify that the device is trusted
– Verify that the device is up to date on Security and Patches
Limit Access and Privilege
- Provide access to applications and resources based on trust verification
Provide limited access based on a known user using an unknown device
Controls for access from:
– Known or unknown devices - – Known or unknown networks
– Plugins
– Missing Patches or out of date security
Enforce Access
Make sure that only your End users access only the data they need for their roles in the organization.