Teaser Thumbnail Shield with lock and text "What is Zero Trust Architecture?"

What is Zero Trust Architecture?

Video URL


Once upon a time, stopping bad actors from accessing your network was primarily a matter of securing a perimeter and limiting access to trusted devices. Today that is no longer enough.

Zero trust architecture (ZTA) is a network security approach based on the principle of trust-but-verify. Implementing ZTA affects virtually all aspects of IT management, including identity, devices, networks, applications, and data.

Everyone in OIT has a role to play in ZTA. Click the link below to watch a video explaining the basics of ZTA and how we are implementing it at CMS.

Recent Stories

Recent Media