2 The Fundamental Components of the Zero Trust Framework
In the world of security, not just Cybersecurity, the identification of an individual is not just a requirement these days, but it is an absolute must. But the ways about going to conduct this identification process vary from company to company; some require multiple layers of it, and some just require one mechanism in order to fully confirm the identity of the person in question (this will be discussed in detail later on in this chapter). Probably, the most traditional way of confirming somebody has been the password.
The Password
In fact, the password is the dinosaur of identification, having gone back decades. It certainly has proved its identity over ...
Get The Zero Trust Framework now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.