White Paper
Zero Trust- Going Beyond the Perimeter
Zero Trust Going Beyond the PerimeterAUTHORS J. Wolfgang Goerlich Wendy Nather Thu Pham 0.0 WHY ZERO TRUST 1 1.0 ZERO TRUST FOR THE WORKFORCE 5 2.0 ZERO TRUST FOR WORKLOADS 7 3.0 ZERO TRUST FOR THE WORKPLACE 10 4.0 SUMMARY 13 Zero Trust Going Beyond the Perimeter1 0.0 Why Zero Trust? The invisible line that we draw between what belongs to the enterprise and what doesn’t — servers, desktops, networks, applications, and logins — traditionally depends on firewalls and endpoint-resident security software to protect that boundary, but the headlines are full of examples where that simply wasn’t enough. People have certainly been promoting the perimeter’s demise for years now: the Jericho Forum was created to tackle “de-perimeterization” as early as 2003. The idea really picke