Understanding the Zero Trust strategy
Identity protection has become a central part of adopting a Zero Trust strategy in organizations looking to improve their security posture. Zero Trust, a security model, describes an approach to designing and implementing systems to protect organizations better.
Zero Trust responds to modern enterprise trends that enable remote users, bring-your-own-device policies, and access to cloud-based resources from multiple locations.
Zero Trust principles are verified explicitly, use least-privilege access, assume breach, and focus on protecting resources, including assets, services, workflows, and network accounts. Therefore, a Zero Trust Architecture (ZTA) leverages these zero-trust principles to plan enterprise infrastructure and workflows.
A Zero Trust model provides a holistic security control plane, segmented into multiple layers of defense:

Figure 3.1 – A Zero Trust model and its layers of defense
Let...