3 The Public Key Infrastructure and BioCryptography

DOI: 10.1201/9781003392965-3

Our last chapter reviewed some of the fundamental components that belong to the Zero Trust Framework (ZTF). It reviewed in detail the concepts of 2FA, MFA, and the Biometric Technologies that are to be used in any kind of Zero Trust deployment. In the end, it was concluded that MFA and the use of Biometrics as the authentication mechanisms would prove to be of most value and importance to a ZTF.

In the examples that we provided in the last chapter, they all shared one common denominator: It was assumed that there was only one user accessing one shared resource. In terms of mathematics, this can be represented as a one to one, or 1: 1 relationship. But in the real ...

Get The Zero Trust Framework now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.