- The 70+ best Black Friday TV deals 2024: Save up to $2,000
- This AI image generator that went viral for its realistic images gets a major upgrade
- One of the best cheap Android phones I've tested is not a Motorola or Samsung
- The best VPN services for iPhone: Expert tested and reviewed
- Docker Desktop 4.36 | Docker
Redirecting the Zero Trust conversation to build a more robust architecture
In a recent Tripwire survey, over 300 respondents from both private and public sectors said that implementing Zero Trust Architecture (ZTA) could materially improve cybersecurity outcomes. This result seems like a positive outcome since we don’t often get such a unanimously high confidence level in a specific security approach from survey data. No doubt, ZTA has the potential to fundamentally change the cybersecurity landscape, and a unified security perspective is something from which we could all benefit given the challenges at hand.
Nearly six months ago, the federal government put its stamp of approval on the Zero Trust security approach in Biden’s first Cybersecurity Executive Order. As architectures evolve and deadlines for agency implementation get closer, we felt it was important to offer reference models that could help agencies determine the best approach. We have done so in our latest guide, A Tripwire Zero Trust Reference Architecture. In the guide, we provide three evolutionary examples of a ZTA, including a reference architecture for Tripwire controls utilized within Zero Trust.
As I mentioned during a recent podcast, one of the tricky things about the term Zero Trust Architecture is that the word “architecture” implies a very well-defined object. In practice, Zero Trust is really a set of principles that are implemented partially in different ways. What’s most important is that all of the organizations trying to achieve some kind of ZTA are marching in the same general direction based on a core set of principles.
Arguably, the most foundational principle of any ZTA, and what I hear most often discussed in customer conversations, is how trust must be continuously verified for every person, device, or entity in a Zero Trust system. What I don’t often hear people discuss is how you maintain the trustworthiness of the systems involved in the architecture itself.
As a company built on the notion that integrity is foundational to cybersecurity, we aim to redirect the Zero Trust conversation toward system integrity. The controls that are provided through Tripwire’s products play a key role in achieving and maintaining system integrity and in ultimately creating a successful ZTA.
If you are a security practitioner responsible for implementing your organization’s Zero Trust strategy, there are two new guides I recommend you download: Building the Foundation of Zero Trust for Long Term Success, which outlines the core principles that determine the success of any Zero Trust implementation; and A Tripwire Zero Trust Reference Architecture, which provides a deeper look into the “how to’s” of building a more robust ZTA.
Read more ABOUT ZERO TRUST
Tripwire Experts Offer Point of View on Zero Trust at EO’s 6-Month Milestone