Zero Trust
Community Posts
What are the key pieces in a zero trust architecture assessment?
I am trying to find a definitive definition of what a logical air gap is. There are various mechanisms of backup access isolation that can be employed but it seems to be a very gray area in terms of an explicit definition. Has anyone come across a definition that might even include a sliding scale of more restrictive logical air gap defenses? For example, I think about several access related configurations that could involve Role based security, MFA, SDN, Firewall, WAN, etc.
Zero trust is the biggest cybersecurity advancement in the past decade.
Strongly agree10%
Agree55%
Neutral23%
Disagree7%
Strongly disagree2%
Yes, both can work together77%
No, one contradicts the other21%
Not sure2%
In terms of ZeroTrust and organizations building out their environments in such a way that makes sense and minimizes risks. As a medium to large enterprise, are you satisfied with your progress to date? To riff a bit more on this topic , NIST 800-207 is a good read, it covers both greenfield and continuous improvement ZeroTrust scenarios. Similar to data compliance, I think most of us never experience greenfield.
Yes59%
No24%
Unsure10%
Too early to tell6%