Adopting Microsegmentation Into Your Zero Trust Model, Part 2

Adopting Microsegmentation Into Your Zero Trust Model, Part 2

This is the second part in a series on zero trust and microsegmentation. Be sure to check out Part 1 here.


Organizations are increasingly using a zero trust approach combined with microsegmentation to carefully balance the needs of security and access. Companies work with most vendors on a purely transactional basis — those vendors simply provide a product or service. But you may hire other vendors that provide a specialized service and expertise that involves a level of collaboration requiring network access.


This might be for a very short time and specific need, such as installing a new technology system. Other vendors may work closely with employees on a project or specific role in more of a contractor capacity. Both your employees and some vendors need access to your system, but you must consider the security aspects of granting that access as well.


What is Microsegmentation?


By starting with the zero trust security approach, your organization verifies all users and devices for access, starting with the assumption that they are not authorized. Next comes network microsegmentation. This creates clearly defined and separated segments for your networks, systems and apps. All users and devices have access only to the areas needed for their specific business purposes. With this combination approach, you reduce the likelihood of an attack and the extent of the damage incurred if an attack does happen.


Learn more on zero trust

How to Set Up Zero Trust and Microsegmentation


Using this approach for vendors requires a step-by-step approach to ensure both security and productivity.


No. 1: De ..