Intelligent CIO LATAM Issue 06 | Page 41

FEATURE : ZERO TRUST
Focusing on three key areas of Zero Trust access
With ZTA , the entire concept of trusted and untrusted zones no longer applies ; location needs to be taken out of the equation entirely . The most effective strategy is a holistic approach that delivers visibility and control by focusing on three key areas : who is on the network , what is on the network and what happens to managed devices when they leave the network .
1 . Who is on the network
Every digital enterprise has a variety of users . Traditional employees access the network , but often contractors , supply chain partners and even customers may need access to data and applications located either on-premises or in the cloud .
For an effective ZTA strategy , it ’ s critical to determine who every user is and what role they play within an organization . The Zero Trust model focuses on a ‘ least access policy ’ that only grants a user access to the

TODAY ’ S NETWORKS NOW HAVE MANY ‘ EDGES ’, SO IT ’ S MUCH HARDER THAN IT USED TO BE TO CREATE

A SINGLE DEFENSIBLE BOUNDARY .

www . intelligentcio . com INTELLIGENTCIO LATAM 41