paint-brush
Zero Trust Network in the Cloud: From Traditional Security Perimeter to Software-Defined Perimeter by@patriciadehemricourt
732 reads
732 reads

Zero Trust Network in the Cloud: From Traditional Security Perimeter to Software-Defined Perimeter

by Patricia de Hemricourt4mDecember 30th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The most advanced Zero Trust architecture today is that of a Software-Defined Perimeter (SDP) In an SDP, unlike in the previous resource and data-centric perimeter, security measures are focused on individual users and their devices. Both users and devices are monitored, and even a trusted user on a trusted device needs to be verified each time they connect and then only gains access to a micro-segmented part of the network. The SDP client functions include device verification and tunnel setup.
featured image - Zero Trust Network in the Cloud: From Traditional Security Perimeter to Software-Defined Perimeter
Patricia de Hemricourt HackerNoon profile picture
Patricia de Hemricourt

Patricia de Hemricourt

@patriciadehemricourt

Passionate about emerging technologies, cybersecurity, AI, ML, and now LLMs.

L O A D I N G
. . . comments & more!

About Author

Patricia de Hemricourt HackerNoon profile picture
Patricia de Hemricourt@patriciadehemricourt
Passionate about emerging technologies, cybersecurity, AI, ML, and now LLMs.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Theteams
Aryan
Learnrepo
Tinfoil-hat