Zero-Trust Architecture
Prompted by the City of Columbus' plans to adopt a "zero-trust network," 10TV's Collin Dorsey discussed benefits and implications with Interhack's C. Matthew Curtin.
Curtin described a zero-trust network in the context of the larger concept of Zero-Trust Architecture. In short, most computer networks have established zones where "inside" systems are trusted by all other insiders. The zero-trust architecture concept implements trustworthiness by requiring devices, applications, and users to identify and to prove their identity. Once identity is proven, the question of authority ("are you allowed to take the requested action?") is addressed. Only then will the systems perform as requested.
In the end, this is a design that means an intruder will have a much more difficult time moving from one system to another, or one application to another. When well managed, these systems can both reduce the likelihood of intrusion, and the impact of any successful intrusion.
See "Columbus approves plan to improve cybersecurity 1 year after cyberattack." (10TV)
About Interhack
Columbus-based Interhack Corporation is a computer expert firm, helping organizations to identify and to protect their assets in a dangerous digital world. In operation since 2000, the firm has a nationwide practice. Interhack is online at web.interhack.com.