From the course: Complete Guide to Cybersecurity: A Practical Approach

Unlock this course with a free trial

Join today to access over 24,400 courses taught by industry experts.

Implementing zero trust and multifactor authentication

Implementing zero trust and multifactor authentication

From the course: Complete Guide to Cybersecurity: A Practical Approach

Implementing zero trust and multifactor authentication

- [Instructor] zero trust is a security concept that assumes that every user, every device, and every network connection is untrusted until it's proven otherwise. In a zero trust environment, access to resources is basically granted on a need-to-know basis and is continuously monitored and authenticated. Zero trust is based on the principle of never trust, always verify. One of the best resources for you to become familiar with zero trust and the zero trust architecture is the NIST Special Publication 800-207, which I'm highlighting in this screen here, and I'm including the link as well. Now, a zero trust architecture is designed and deployed with adherence with the following Cisco trust basic tenants, and this is straight from the NIST Special Publication. First, that all data sources and computer services are considered resources. All communications is secure, regardless of the network location, whether it's on-premise or in the cloud. And also that access to individual enterprise…

Contents