Zero Trust and Endpoint Security

The concept of zero trust can be applied to endpoint systems as well as to networks. Zero trust in the context of endpoint security focuses on endpoints as self-defending systems that presume that users, other systems, and the network they are connected to cannot be trusted. In an environment designed with a zero trust concept in mind, endpoints will limit user permissions to only those required, may require authentication and authorization before tasks are allowed to be performed, and will use a broad range of defensive and monitoring techniques to help prevent attacks.

Endpoints also have a role to play as part of the monitoring and detection infrastructure for a broader zero trust environment. They report ...

Get Cyberwarfare: Information Operations in a Connected World, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.