BrandPost: Network Security and the Heart of a Zero Trust Architecture

BrandPost: Network Security and the Heart of a Zero Trust Architecture

As part of a Zero Trust approach to cybersecurity, network flows should be authenticated before being processed and access determined by dynamic policy. A network that is intended to never trust, and to always verify all connections, requires technology that can determine confidence and authorize connections and provide that future transactions remain valid. 

The heart of any  Zero Trust Architecture (ZTA) is an authorization core involving equipment within the control plane of the network that determines this confidence and continually evaluates confidence for every request. Given that the authorization core is part of a control plane, it needs to be logically separated from the portion of the network used for application data traffic (the data plane).

To read this article in full, please click here



Support the originator by clicking the read the rest link below.