Zero Trust Paper.pdf (163.84 kB)
Download fileThe Why and How of adopting Zero Trust Model in Organizations
As organizations move most of their workloads to public cloud and remote work becomes more
prevalent today, enterprise networks become more exposed to threats both from inside and outside
the organization. The traditional Perimeter Security Model assumes that threats are always from the
outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and
software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,
which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates
and evaluates the model based on the various implementations by the leading industry players like
Google and Microsoft.
Funding
Anita Nair
History
Email Address of Submitting Author
march.nair@gmail.comSubmitting Author's Institution
EY GDSSubmitting Author's Country
- India