{"id":48549,"date":"2019-05-17T15:51:49","date_gmt":"2019-05-17T20:51:49","guid":{"rendered":"https:\/\/eshop.macsales.com\/blog\/?p=48549"},"modified":"2019-05-24T10:50:25","modified_gmt":"2019-05-24T15:50:25","slug":"zero-trust-a-new-way-to-look-at-network-security","status":"publish","type":"post","link":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/","title":{"rendered":"Networking and Security Series: Zero Trust, a New Way to Look at Network Security"},"content":{"rendered":"<figure id=\"attachment_48560\" aria-describedby=\"caption-attachment-48560\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-48560\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705.png\" alt=\"Principles of zero trust security. Image via Centrify\" width=\"640\" height=\"272\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705.png 640w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705-282x120.png 282w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705-284x121.png 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705-190x81.png 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705-282x120@2x.png 564w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705-284x121@2x.png 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/zero-trust-cycle-diagram-e1558114274705-190x81@2x.png 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-48560\" class=\"wp-caption-text\">Principles of zero trust security. Image via Centrify<\/figcaption><\/figure>\n<p>We hope you&#8217;ve been learning a lot both about networking and securing networks from the Rocket Yard&#8217;s network and security series. So far, that series includes:<\/p>\n<ul>\n<li><a href=\"https:\/\/eshop.macsales.com\/blog\/48220-networking-and-security-series-all-about-dns\" target=\"_blank\">All About DNS<\/a><\/li>\n<li><a href=\"https:\/\/eshop.macsales.com\/blog\/48245-networking-and-security-series-wi-fi-security-revealed\" target=\"_blank\">Wi-Fi Security Revealed<\/a><\/li>\n<li><a href=\"https:\/\/eshop.macsales.com\/blog\/48387-networking-and-security-series-what-the-new-wi-fi-6-standard-brings-to-wireless-networking\" target=\"_blank\">What the New Wi-Fi 6 Standard Brings to Wireless Networking<\/a><\/li>\n<\/ul>\n<p>Today we&#8217;re talking about a new IT security model that is changing the way that companies look at securing their networks: <strong>Zero Trust Security<\/strong>. To explain how it works and how it is different from traditional network security models, we need to look at how the current models work.<\/p>\n<figure id=\"attachment_48555\" aria-describedby=\"caption-attachment-48555\" style=\"width: 428px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/349098.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-48555\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/349098.jpg\" alt=\"Bodiam Castle, East Sussex, England. \" width=\"428\" height=\"318\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/349098.jpg 428w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/349098-162x120.jpg 162w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/349098-284x211.jpg 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/349098-190x141.jpg 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/349098-162x120@2x.jpg 324w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/349098-190x141@2x.jpg 380w\" sizes=\"auto, (max-width: 428px) 100vw, 428px\" \/><\/a><figcaption id=\"caption-attachment-48555\" class=\"wp-caption-text\">Bodiam Castle, East Sussex, England.<\/figcaption><\/figure>\n<h3>The Castle-and-Moat Security Concept<\/h3>\n<p>For most companies, network security is currently based on what is called the &#8220;<strong>castle-and-moat concept<\/strong>&#8220;. In the physical analogy, think of a castle that is surrounded by a deep moat, preferably filled with alligators. There&#8217;s only one way in and out of the castle, over a drawbridge that is heavily guarded. Anyone attempting to enter the castle must pass a rigorous security check by some wary guards who look for weapons, check the identity of the person, and so on.<\/p>\n<p>Once that person is trusted, they&#8217;re allowed free access to the castle and everything in it. In fact, everyone inside the castle is trusted by default. There&#8217;s a problem with this, of course &#8212; if a person that gains access is actually an attacker, they have free reign to wreak havoc on everything inside the castle.<\/p>\n<p>Applying this to network security, think of the castle as an internal network of a company and the drawbridge and guards as a traditional firewall and password challenge\/response system. If a hacker happens to gain access to the network by breaking a password through brute force methods, he&#8217;s trusted to the network and can start taking down internal systems one by one&#8230;<\/p>\n<p>Making this vulnerability even worse is that companies no longer store their data or have their system in just one place &#8212; they are distributed amongst a variety of cloud vendors, so control of security becomes more difficult.<\/p>\n<p>The traditional concept can also be thought of as &#8220;<strong>trust, but verify<\/strong>&#8220;. In other words, you can pretty much trust that the vast majority of people attempting to gain access to your network are not hackers, but you need to verify that they have the proper credentials to get that access.<\/p>\n<figure id=\"attachment_48556\" aria-describedby=\"caption-attachment-48556\" style=\"width: 640px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422.jpeg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-48556\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422.jpeg\" alt=\"A title screen from the TV show &quot;The X-Files&quot;\" width=\"640\" height=\"378\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422.jpeg 640w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422-203x120.jpeg 203w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422-284x168.jpeg 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422-190x112.jpeg 190w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422-203x120@2x.jpeg 406w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422-284x168@2x.jpeg 568w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/1T8tGc8RTgUbbr8VB2ClNag-e1558113520422-190x112@2x.jpeg 380w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><figcaption id=\"caption-attachment-48556\" class=\"wp-caption-text\">A title screen from the TV show &#8220;The X-Files&#8221;<\/figcaption><\/figure>\n<h3>The Zero Trust Security Model<\/h3>\n<p>Zero Trust security means that no one is trusted by default either inside or outside a corporate network, so verification is required from everyone who wants access to resources on the network. During a conference I attended a few weeks ago, a speaker used a line from the great 1990&#8217;s sci-fi classic series &#8220;The X-Files&#8221; to describe Zero Trust Security &#8212; &#8220;<strong>Trust No One<\/strong>&#8220;.<\/p>\n<p>Enabling zero trust security requires strict identity verification for every person and device attempting to access resources on a private network, whether they&#8217;re inside or outside the corporate network perimeter. There&#8217;s not one specific technology associated with the zero trust model; instead, it can be thought of as a holistic approach to network security incorporating different principles and technologies.<\/p>\n<p>The term &#8220;zero trust&#8221; first appeared in 2010 when a Forrester Research Inc. analyst first presented the concept. Just a few years later, Google announced that they had implemented zero trust security in their network, leading to increased interest in adopting the model by the tech community.<\/p>\n<h3>Principles and Technologies Behind The Zero Trust Security Model<\/h3>\n<p>The image at the top of this article shows the basic tenets behind the zero trust security model. The network verifies who the user is, validates that the device being used actually has the authority to enter the network, and then the user is limited in what he or she can access. The zero trust model is paranoid by design &#8212; you assume that attackers are everywhere, inside and outside of the network, so no devices or users are automatically trusted. Let&#8217;s look at some of these principles in detail.<\/p>\n<p>One principle of the zero trust model is <strong>least-privilege access<\/strong>. This means that users are only given as much access as they need to resources on the network. Each user&#8217;s exposure to sensitive parts of the network is minimized by giving them no access to systems they don&#8217;t need access to and then providing them with only enough access to do their job. In another analogy, think of this as a navy admiral giving officers and sailors information on a need-to-know basis.<\/p>\n<p><strong>Microsegmentation<\/strong> is also used by zero trust networks. This is the practice of breaking up security perimeters into small zones, maintaining separate access for different parts of the network. As an example, a network with files stored in a single data center that uses micro-segmentation might have a dozen of separate secure zones. A person or a program with access to one of those zones won&#8217;t have access to any of the other zones without obtaining authorization first.<\/p>\n<p><a href=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-23-at-3.38.39-PM.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-47176\" src=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-23-at-3.38.39-PM.jpg\" alt=\"\" width=\"300\" height=\"305\" srcset=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-23-at-3.38.39-PM.jpg 300w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-23-at-3.38.39-PM-118x120.jpg 118w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-23-at-3.38.39-PM-284x289.jpg 284w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-23-at-3.38.39-PM-187x190.jpg 187w, https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/01\/Screen-Shot-2019-01-23-at-3.38.39-PM-118x120@2x.jpg 236w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>Another core piece of zero trust security is one that many Rocket Yard readers may be familiar with: <strong>Multi-Factor Authentication<\/strong> (<strong>MFA<\/strong>). MFA means that more than just a simple password is required to authenticate a user and gain access to a network &#8212; two or more pieces of evidence are required.<\/p>\n<p>MFA is most widely seen in <strong>2-factor authentication<\/strong> (<strong>2FA<\/strong>) systems that can be used on many popular online platforms, including iCloud, Facebook, Amazon and Google. A user requesting access first enters a password, but then must also enter a code that is sent to another device like a smartphone. By doing this, the user has provided two pieces of evidence that they are who they claim to be.<\/p>\n<p>Finally, not only is user access controlled, but zero trust also requires strict controls on access by devices. A well-designed zero trust system monitors how many devices are attempting to access the network and ensures that every device is authorized. This can be done several ways, by including a digital key on each device or matching MAC (media access control) addresses for each approved device when they attempt to connect to the network.<\/p>\n<p>Next week, we&#8217;ll be discussing <strong>Virtual Private Networks<\/strong> (VPNs), which are the current &#8220;castle-and-moat&#8221; way of attempting to provide encrypted access to networks. VPNs don&#8217;t take user access policies into account, authenticating users by identity is difficult, and they can also slow down system access. Zero trust networks enforce access rules at the edge of the network rather than at the source, so latency isn&#8217;t an issue and users find that their system access is speedy. Despite the issues of VPNs, it may be years before all companies adopt zero trust security, so VPNs are an easy and cost-effective interim solution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We hope you&#8217;ve been learning a lot both about networking and securing networks from the Rocket Yard&#8217;s network and security series. So far, that series includes: All About DNS Wi-Fi Security Revealed What the New Wi-Fi 6 Standard Brings to Wireless Networking Today we&#8217;re talking about a new IT security model that is changing the [&hellip;]<\/p>\n","protected":false},"author":81,"featured_media":48583,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"spay_email":"","footnotes":""},"categories":[6573],"class_list":["post-48549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.2 (Yoast SEO v20.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Zero Trust, a New Way to Look at Network Security<\/title>\n<meta name=\"description\" content=\"\u201cTrust no one\u201d is what the X-Files taught us in the 1990s. So tear down your Castle-and-Moat Security and rebuild with the principles behind Zero Trust.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Networking and Security Series: Zero Trust, a New Way to Look at Network Security\" \/>\n<meta property=\"og:description\" content=\"\u201cTrust no one\u201d is what the X-Files taught us in the 1990s. So tear down your Castle-and-Moat Security and rebuild with the principles behind Zero Trust.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Rocket Yard\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/stevensande\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-17T20:51:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-24T15:50:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/X-Files-Trust-No-One.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"572\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Steve Sande\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Sande\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/\"},\"author\":{\"name\":\"Steve Sande\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/1152721d0acb70692858d0f3fcb12e7a\"},\"headline\":\"Networking and Security Series: Zero Trust, a New Way to Look at Network Security\",\"datePublished\":\"2019-05-17T20:51:49+00:00\",\"dateModified\":\"2019-05-24T15:50:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/\"},\"wordCount\":1181,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"keywords\":[\"Data Security\",\"Networking\",\"Security\",\"two-factor authentication\"],\"articleSection\":[\"Networking &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/\",\"name\":\"Zero Trust, a New Way to Look at Network Security\",\"isPartOf\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\"},\"datePublished\":\"2019-05-17T20:51:49+00:00\",\"dateModified\":\"2019-05-24T15:50:25+00:00\",\"description\":\"\u201cTrust no one\u201d is what the X-Files taught us in the 1990s. So tear down your Castle-and-Moat Security and rebuild with the principles behind Zero Trust.\",\"breadcrumb\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/eshop.macsales.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Networking and Security Series: Zero Trust, a New Way to Look at Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#website\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"name\":\"Rocket Yard\",\"description\":\"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.\",\"publisher\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#organization\",\"name\":\"OWC\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"contentUrl\":\"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png\",\"width\":1024,\"height\":1024,\"caption\":\"OWC\"},\"image\":{\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/1152721d0acb70692858d0f3fcb12e7a\",\"name\":\"Steve Sande\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1ad8e267ec82e12963d9cfe717c9b8e108e1edbb728f5d91fe50c6e7ecd14b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1ad8e267ec82e12963d9cfe717c9b8e108e1edbb728f5d91fe50c6e7ecd14b15?s=96&d=mm&r=g\",\"caption\":\"Steve Sande\"},\"description\":\"Steve has been writing about Apple products since 1986, starting on a bulletin board system, creating the first of his many Apple-related websites in 1994, joining the staff of The Unofficial Apple Weblog in 2008, and founding Apple World Today in 2015. He\u2019s semi-retired, loves to camp and take photos, and is an FAA-licensed drone pilot.\",\"sameAs\":[\"https:\/\/appleworld.today\",\"https:\/\/facebook.com\/stevensande\",\"https:\/\/www.linkedin.com\/in\/stevensande\/\",\"https:\/\/www.youtube.com\/channel\/UCUnDTuaRnXncKQXfQYVNIJA\/\"],\"url\":\"https:\/\/eshop.macsales.com\/blog\/author\/steve-sande\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zero Trust, a New Way to Look at Network Security","description":"\u201cTrust no one\u201d is what the X-Files taught us in the 1990s. So tear down your Castle-and-Moat Security and rebuild with the principles behind Zero Trust.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/","og_locale":"en_US","og_type":"article","og_title":"Networking and Security Series: Zero Trust, a New Way to Look at Network Security","og_description":"\u201cTrust no one\u201d is what the X-Files taught us in the 1990s. So tear down your Castle-and-Moat Security and rebuild with the principles behind Zero Trust.","og_url":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/","og_site_name":"Rocket Yard","article_author":"https:\/\/facebook.com\/stevensande","article_published_time":"2019-05-17T20:51:49+00:00","article_modified_time":"2019-05-24T15:50:25+00:00","og_image":[{"width":572,"height":650,"url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/X-Files-Trust-No-One.jpg","type":"image\/jpeg"}],"author":"Steve Sande","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Steve Sande","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/#article","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/"},"author":{"name":"Steve Sande","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/1152721d0acb70692858d0f3fcb12e7a"},"headline":"Networking and Security Series: Zero Trust, a New Way to Look at Network Security","datePublished":"2019-05-17T20:51:49+00:00","dateModified":"2019-05-24T15:50:25+00:00","mainEntityOfPage":{"@id":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/"},"wordCount":1181,"commentCount":1,"publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"keywords":["Data Security","Networking","Security","two-factor authentication"],"articleSection":["Networking &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/","url":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/","name":"Zero Trust, a New Way to Look at Network Security","isPartOf":{"@id":"https:\/\/eshop.macsales.com\/blog\/#website"},"datePublished":"2019-05-17T20:51:49+00:00","dateModified":"2019-05-24T15:50:25+00:00","description":"\u201cTrust no one\u201d is what the X-Files taught us in the 1990s. So tear down your Castle-and-Moat Security and rebuild with the principles behind Zero Trust.","breadcrumb":{"@id":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eshop.macsales.com\/blog\/48549-zero-trust-a-new-way-to-look-at-network-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/eshop.macsales.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Networking and Security Series: Zero Trust, a New Way to Look at Network Security"}]},{"@type":"WebSite","@id":"https:\/\/eshop.macsales.com\/blog\/#website","url":"https:\/\/eshop.macsales.com\/blog\/","name":"Rocket Yard","description":"Your source for expert tips, special deals, commentary, reviews, and the latest tech news.","publisher":{"@id":"https:\/\/eshop.macsales.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eshop.macsales.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eshop.macsales.com\/blog\/#organization","name":"OWC","url":"https:\/\/eshop.macsales.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","contentUrl":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2020\/06\/rocket-yard-logo-round.png","width":1024,"height":1024,"caption":"OWC"},"image":{"@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/1152721d0acb70692858d0f3fcb12e7a","name":"Steve Sande","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eshop.macsales.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1ad8e267ec82e12963d9cfe717c9b8e108e1edbb728f5d91fe50c6e7ecd14b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1ad8e267ec82e12963d9cfe717c9b8e108e1edbb728f5d91fe50c6e7ecd14b15?s=96&d=mm&r=g","caption":"Steve Sande"},"description":"Steve has been writing about Apple products since 1986, starting on a bulletin board system, creating the first of his many Apple-related websites in 1994, joining the staff of The Unofficial Apple Weblog in 2008, and founding Apple World Today in 2015. He\u2019s semi-retired, loves to camp and take photos, and is an FAA-licensed drone pilot.","sameAs":["https:\/\/appleworld.today","https:\/\/facebook.com\/stevensande","https:\/\/www.linkedin.com\/in\/stevensande\/","https:\/\/www.youtube.com\/channel\/UCUnDTuaRnXncKQXfQYVNIJA\/"],"url":"https:\/\/eshop.macsales.com\/blog\/author\/steve-sande\/"}]}},"jetpack_featured_media_url":"https:\/\/eshop.macsales.com\/blog\/wp-content\/uploads\/2019\/05\/X-Files-Trust-No-One.jpg","jetpack_shortlink":"https:\/\/wp.me\/pmPaT-cD3","_links":{"self":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/48549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/comments?post=48549"}],"version-history":[{"count":6,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/48549\/revisions"}],"predecessor-version":[{"id":48816,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/posts\/48549\/revisions\/48816"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media\/48583"}],"wp:attachment":[{"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/media?parent=48549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eshop.macsales.com\/blog\/wp-json\/wp\/v2\/categories?post=48549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}