LevelBlue Blog
Tag: Zta
The Zero Trust Authorization Core
April 8, 2020 | Derrick Johnson
This is part 2 of a 3 blog series. You can also read part 1 and part 3 The Foundation of a Zero Trust Architecture (ZTA) talked about the guiding principles, or tenets of Zero Trust. One of the tenets mentions how all network flows are to be authenticated before being processed and access is determined by dynamic policy. A network… Read more →
The foundation of a Zero Trust architecture
April 1, 2020 | Derrick Johnson
Part 1 of a 3 blog series. You can also read part 2 and part 3. Organizations have placed a lot of time, effort and capital spend on security initiatives in an effort to prevent security breaches and data loss. Even the most advanced “next generation” application layer firewalls filtering malicious traffic at the network perimeter has only revealed equal if… Read more →