Question: In this discussion board post, you will analyze how Zero Trust can help protect against malicious behavior and malware attacks. Please analyze and discuss


In this discussion board post, you will analyze how Zero Trust can help protect against malicious behavior and malware attacks. Please analyze and discuss the following: The Zero Trust model is built upon the following 5 assumptions: The network is always assumed to be hostile External and internal threats exist on the network at all times The location of the network is not enough for determining trust in the network Every device, user, network and workflow is authenticated and authorized Policies must be dynamic and uniquely calculated from all possible sources of data 1. Why is the assumption that the network and all its elements are hostile a key tenet of the Zero Trust Architecture? 2. Discuss the concept that the Zero Trust approach assumes that all Networks are "Hostile" and "Dangerous" at all times. 3. Based on your current job and experience in Cybersecurity, why is it required that every user, every device, network components and workflow must be properly authenticated and authorized? Explain what you think we need to stop doing, as defenders, to apply this concept into the enterprise to make it more secure? 4. Another key tenet of Zero Trust is that trust should never be granted implicitly and that any trust given needs to be constantly evaluated. Discuss this concept and explain the value and the pros and cons associated with this approach.
Step by Step Solution
3.40 Rating (150 Votes )
There are 3 Steps involved in it
In this discussion board post you will analyze how Zero Trust can help protect against malicious behaviour and malware attacks Please analyze and discuss the following The Zero Trust model is built up... View full answer
Get step-by-step solutions from verified subject matter experts
