Zero Framework
The initial components of the ZTF are IAM, access control, policy management, policy enforcement, and monitoring of all components. The ZTF does nothing by itself and only provides value when leveraged in conjunction with SASE services. These are dependent upon the ZTF components to continually provide effective security. Eventually, most SASE services will eliminate overlapping solution components. However, it is not expected that all attribute overlap will be removed. The reason some services must overlap features, functions, attributes, and other components is context. Context is the most often misunderstood concept when providing any human or machine communication. We will cover context in the upcoming Zero trust section.
Zero trust leverages the foundational concepts of the validated identity of the user, device, system, service, resource, or application, prior to any policy that allows access.
Identity is the first and highest priority. If we can eliminate...