Zero Trust Model

Takeaways:

  • Don’t rely on DMZ and perimeter
  • Bad actors are always present
  • Never trust, always verify

Key Indicators

  • Authenticate, authorization
  • Whitelist, not blacklist
  • Encrypt everything
  • Minimize atatck surface
  • Continuously Monitor Behavior

resources: