Member-only story

Zero Trust Architecture: Never Trust, Always Verify

Gupta Bless
7 min readJun 4, 2022

--

Photo by Ed Hardie on Unsplash

Introduction

Access control policies are typically in place at organizations in order to regulate access to a variety of resources. Organizations will employ a variety of perimeter security measures in order to protect their assets and ensure that only authorized individuals may have access to those resources. It appears that employees will only access the resources from within the organization, hence the first step in providing security for the company should be to establish a secure perimeter around the premises. They can use the Virtual Private Network (VPN) in the event that they need to access the resources from a location outside of the corporation.

Users are able to access their asset or resource from anywhere, regardless of whether they are physically present in the office or not. Additionally, organizations are moving toward the use of cloud infrastructure, in which they are adopting SaaS or IaaS functionality; in this case, perimeter security does not function very well. For example, some offices now allow their employees to work from home or from anywhere, allowing users to access their assets or resources from anywhere. When it comes to providing security to enterprises, a zero trust approach always keeps in mind all of the variables that are worried for cyber attacks in today’s world, such as the use of cloud…

--

--

Gupta Bless
Gupta Bless

Written by Gupta Bless

Security enthusiast working to secure web for others.

No responses yet