Zero Trust represents a paradigm shift in information security. For a long time, a perimeter-centric security approach was used to secure corporate resources. If actors were located within a perimeter, e.g. in the internal network, they were basically trusted. The basic assumption behind Zero Trust is that a corporate environment is no more trustworthy than a non-corporate environment. Applications, services, devices and users are not implicitly trusted.
Zero Trust is highly relevant today when it comes to securing corporate resources such as cloud services, IoT and networks. But what exactly is behind the term and how can Zero Trust be implemented? This presentation will show solution approaches that answer essential questions about Zero Trust.