Adopting Microsegmentation Into Your Zero Trust Model, Part 1

Adopting Microsegmentation Into Your Zero Trust Model, Part 1

The idea to discuss microsegmentation and zero trust came to me while reading cybersecurity articles over cellular data as I was waiting in line one day.


And, I wrote this article on different devices: on my laptop connected to my home wireless network; on my tablet over Wi-Fi. Each time I switched devices or wireless networks — or even worse, both — I increased my risk for attacks because I opened up a new endpoint for potential breaches or entry points for bad actors.


Like me, employees and organizations across the country are working on whatever device and network most accessible to them — as the lines between work and home have almost all but faded in the past year. When you apply this across an entire workforce, these habits mean a substantial increase in security risk and vulnerabilities.


Let’s take a look at how enterprise can use network microsegmentation and zero trust to manage internal relationships. Future posts in this series will delve into applying the strategy to vendors and customers.


Security Shifting to a Zero Trust Model


Working from anywhere is now the norm, not the exception. In the past, business leaders focused on the perimeter, but the shift of remote working combined with multiple cloud environments and personal devices means this approach isn’t enough. Protecting today’s work environment — which can now be anywhere in the world — requires more than purchasing new tech or infrastructure. Managing permissions and access to workloads across a data environment instead requires a major shift in strategy, technology and processes.


More and more, companies are turning to the zero trust model. This means assuming that each person or device requesting access to the network ..

Support the originator by clicking the read the rest link below.