What is Best Practice Zero Trust Cybersecurity?
Originally, Zero Trust Network (ZTN) concepts were developed by the US Department of Defense
(DoD) in the early 2000s while defining Global Information Grid (GIG) Network Operations (NetOps)
Black Core routing and addressing architecture, part of the DoD’s Netcentric Service Strategy. Over
time, this concept evolved within the DoD intelligence and security communities into the current
ZTN/SDP framework and test lab1
. Around the same time, Forrester, a market research company that
provides advice on technology began promoting ZTN as a worthwhile consideration for enterprise
security teams. Today, Zero Trust has grown widely in adoption, as well as scope.
According to Forrester, there are three main concepts: -
Ensure that all resources are securely accessed no matter who creates the traffic or from where it originates -
A least privilege strategy that enforces access control to eliminate temptation to access restricted resources. -
Continuously logging and monitoring user traffic for signs of suspicious activity.
|
Information Resources
Software Defined Perimeter and Zero Trust
Cloud Application Security Architecture
Cloud Migration Security Guide
Identity Management Landscape

Cloud Security Standards: What to Expect and What to Negotiate V 2.0
Cloud Customer Architecture for Securing Workloads on Cloud Services
|
Backdoors in network monitoring, scan and exploit accelerating, executive phishing, ransomware profits booming, the signs have been there for years. The question is, what are we doing about it?
According to the IBM Data Breach Reports of 2020 - 2024, there were over 500 organizations per annum with a serious data breach - increasing costs to on average $4.88 USD -
main causes were insecure data storage, insider threats, compromised credentials and platform vulnerabilities.
Around 80% involve customers’ Personally Identifiable Information (PII). This is in the context of a
complex security environment - cloud migration, increasing use of DevOps and infrastructure build automation, increase in remote working.
On a positive note, increasing security incident response capability reduces the costs of data breaches. Still, the focus has to be on protecting the identity credentials and
implementing best practice network, platform and application security - this means Zero Trust principles and a ZT maturity strategy to go from holes in the bucket to an impermeable enterprise.
Applications are only as secure as the encapsulated identity data. Verv IAM offers identity services for people, applications and devices. Verv IAM Identity as a Service (IDaaS)
provides enterprise data security for end users over the public internet. Private data has to be secured to be
European Union GDPR compliant.
Prior to the issuing of identity tokens, all assets are vulnerable. Verv IAM encrypts private data in the browser. Real data protection ensures only the account holder ever sees private data unencrypted.
No complex protocol exchange security vulnerabilities. Authentication revolution!