At the core, a Zero Trust Security model is focused on protecting your local area network (LAN). Many organizations believe that once inside their network, everything is secure and trusted. In a Zero Trust environment, everything must be verified. For example, rather than having your user workstations connect directly with your printer, they have to go through a secured server. If the printer is corrupted, the intermediary server prevents the threat from reaching the users' network. Zero Trust best practices include:
-
Layered MFA and identity management
-
Endpoint management solutions such as InTune
-
Isolate personal computers from company networks via virtual workstations