Biometric Update recently reported that “Data is the new security perimeter. That notion is the foundation of a new document from the U.S. executive branch on how agencies can adopt zero-trust cybersecurity practices.”
The Zero-Trust Cybersecurity practice does not target foreign enemies who pose a threat. Rather, Cyber expert Ravi Das describes the Zero Trust framework as follows:
“With the Zero Trust Framework, the traditional Identity and Access Management model is taken to another extreme in which no one at all is trusted in either the internal or external environments of a company. In other words, it is not just end-users, but also devices and the higher-ranking members of the C-Suite and the Board of Directors who cannot be trusted. To gain access to what they need, all of these entities must be fully vetted and authenticated to the maximum level possible.”
Want to learn more about the Zero Trust approach? Start with these expert-authored articles on the Keesing Platform:
- An Introduction to the Zero Trust Framework by Ravi Das
- Biometrics and the Zero Trust Framework: Perimeter Security vs. Zero Trust Framework Approach – A series by Ravi Das, Anthony Figueroa, and Patrick Ward
- ZTF: The Secret to Seamless Authentication – Protecting data/communication/IDs from cryptographic attacks A series by Ravi Das, Anthony Figueroa, and Patrick Ward
Sources/References: