The concept of “Zero Trust” was coined back in 2010, on the basis that traditional perimeter security models failed to provide adequate protection because the idea of a trusted internal network and untrusted external network is inherently flawed. The solution is to change the trust model, so that no user is automatically trusted.
Today, Zero Trust Access (ZTA) has become something of a buzzword in the industry, with many vendors offering their ZTA solutions. Even the latest executive order on cybersecurity from President Joe Biden includes mandates for Zero Trust. Although the term is seemingly everywhere, implementation continues to lag. A big part of the reason for the slow adoption is there are still a lot of confusion and unknowns about ZTA, what it actually means, and how you get started.