What is Zero Trust Architecture?
Once upon a time, stopping bad actors from accessing your network was primarily a matter of securing a perimeter and limiting access to trusted devices. Today that is no longer enough.
Zero trust architecture (ZTA) is a network security approach based on the principle of trust-but-verify. Implementing ZTA affects virtually all aspects of IT management, including identity, devices, networks, applications, and data.
Everyone in OIT has a role to play in ZTA. Click the link below to watch a video explaining the basics of ZTA and how we are implementing it at CMS.