Ready to Work Together?
Let's discuss how our expertise can help transform your business.
Jeremy Dodson
·
May 21, 2021
If you pay attention to cybersecurity and networking trends, you may have heard a lot of talk about zero-trust architecture. Zero-trust was even mentioned in the Executive Order on Improving the Nation’s Cybersecurity.
Hi, I’m Jeremy Dodson, CISO here at NextLink Labs, and today we are talking about what zero-trust architecture is and how it can benefit your organization.
Traditional network architecture takes on a castle defense design, with users, devices, and applications on the outside considered untrustworthy.
Those on the inside, behind the perimeter defenses, are considered trustworthy and are generally allowed to freely traverse the network.
This traditional design has become problematic for several reasons. Here's two issues with traditional network architectures.
First, the assumption that any user or device behind your firewall is authorized and well-intentioned, is dangerous. Malicious actors may gain access to your network through unexpected vectors like web connected printers, cameras, or misconfigured tools. Once inside, they can move laterally to their real target, your data.
This design also allows internal users to intentionally or unintentionally compromise data or disrupt critical systems.
Second, modern designs no longer reflect the binary ‘inside or outside’ architecture. With the increasing prevalence of cloud hosted data and workers accessing the network remotely, it’s time to rethink secure network design.
Zero-trust architecture design addresses these concerns by assuming everything is untrustworthy. Trust is only granted after strong authentication and authorization controls are passed.
In addition to these controls, filtering, analytics, and logging are employed to monitor activities within the network. Many tools and services are available for organizations who want to implement zero-trust principles. If you choose to use these third-party offerings, ensure your team is properly trained and the tools are configured to fit your organization.
If you want to know what others are doing to integrate zero-trust and modernize their security measures, reach out to us here at NextLink Labs. We would be happy to answer any questions to support your organization and your endeavor to improve your cybersecurity program.
As always, stay safe, stay secure, and stay curious.
Author at NextLink Labs
Learn how U.S. companies can navigate DeepSeek's privacy policies and data risks while leveraging its AI tools effectively. Discover key strategies for compliance and data security.
Jeremy Dodson
·
Feb 28, 2025
Essential cybersecurity resolutions for 2025 to safeguard your organization: proactive threat detection, regular audits, cyber hygiene, data privacy, and robust incident response plans.
Jeremy Dodson
·
Feb 28, 2025
Cybersecurity
Prevent healthcare data breaches with strategies to secure PHI and PII. Learn key steps to protect patient data, meet compliance, and enhance cybersecurity
Leah Dodson
·
Nov 11, 2024
Cybersecurity
Navigate SOC2 compliance in healthcare with this in-depth guide. Explore requirements, security tips, and best practices to safeguard patient data.
Leah Dodson
·
Oct 29, 2024
Let's discuss how our expertise can help transform your business.