LATEST INTELLIGENCE
GETTING STARTED
WITH ZERO TRUST
NEVER TRUST, ALWAYS VERIFY
E
Executive Summary
PRESENTED BY
Download whitepaper here
Zero Trust security throws away the idea that we
should have a “trusted” internal network and an
“untrusted” external network.
The adoption of mobile and cloud means that we
can no longer have a network perimeter-centric
view of security; instead, we need to securely enable
access for the various users (employees, partners,
contractors, etc.) regardless of their location, device
or network.
There is no silver bullet when it comes to achieving
a Zero Trust security architecture, but identity and
access management is the core technology that
organizations should start with on their Zero Trust
journeys. Here, we’ll explore the shifts in the security
landscape that led to the creation of Zero Trust, what
the Zero Trust Extended Ecosystem (ZTX) framework
looks like today, and how organizations can utilize
20
INTELLIGENTCIO
Okta as the foundation for a successful Zero Trust
program now, and in the future.
Challenge: When the Wall Protecting Your
Data Vanishes
Traditional security architectures were built with two
groups in mind: trusted individuals, able to access
everything inside the organization, and untrusted
individuals, kept on the outside. Security and IT
teams invested in defensive systems that protected
the barrier between them, focusing heavily on
securing the network perimeter, often with firewalls.
While they were successful in building a wall between
potential threats and the safety of the corporate
ecosystem, this full-trust model is problematic,
because when that perimeter is breached, an
attacker has relatively easy access to everything on
a company’s privileged intranet – not to mention
the havoc a rogue insider could wreak without even
breaching the perimeter. n
www.intelligentcio.com