With the development of advanced technologies and the spread of increasingly complex corporate networks, the number of cyber attacks is also growing rapidly.
In most cases, the aim is to impersonate legitimate users or services in order to access sensitive data or particularly critical systems, causing economic damage and impacting national security.
Consequently, cybersecurity must travel hand in hand with the new threats in order to limit their range as much as possible.
In this regard, an approach that is spreading very fast is the Zero Trust security model, based on the concept 'Never trust, always verify'encapsulated in its 3 principles:
1. no user or application can be regarded as trustworthy unless its identity is first verified;
2. each user is granted only the minimum privileges necessary to perform the task he or she is interested in;
3. it is assumed to be in an environment where a threat is already present, so communications are considered hostile and access to resources is limited to what is necessary.
Attached is the full report of our Cyber team to deepen and better understand the approach 'Zero Trust'between technical aspects and use cases.