Perspectives from 50+ Years’ Practical Zero Trust Experience and Learnings on Buyer Expectations and Industry Promises

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Everybody’s talking about Zero Trust (ZT). Even the White House issued an Executive Order to start implementing Zero Trust. Many technology manufacturers position their products as enabling or fulfilling ZT requirements. ZT focuses on eliminating trust in the digital network, verifying all traffic, and segmenting the environment. By enforcing on every service, user, or application, strict access and verification policy avoid bad actors having unauthorized access to systems. This paper continues the authors’ previous research on examining Zero Trust approaches. It defines the core problems of vendor promises which causes Information Asymmetry that impede the understanding and successful implementation of Zero Trust. We first start with a description of Zero Trust and continue with practical lessons that we have gathered from six expert interviews with a collective experience of over 50 years implementing Zero Trust in diverse settings. The paper finishes by providing concrete guidance and examples that practitioners can consider when implementing Zero Trust.

Cite

CITATION STYLE

APA

Bobbert, Y., Scheerder, J., & Timmermans, T. (2022). Perspectives from 50+ Years’ Practical Zero Trust Experience and Learnings on Buyer Expectations and Industry Promises. In Lecture Notes in Networks and Systems (Vol. 508 LNNS, pp. 864–881). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-031-10467-1_53

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free