<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4218#M434</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/797288093"&gt;@Early_Adopter&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your great comments and the jolly tone! You are right--don't trust my website at least at the offset!&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.isc2.org/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; Thank you for the &lt;SPAN&gt;Google's BeyondCorp link! The portal is a treasure trove of great research information. Have a great weekend!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;All the best!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-Aleksandr&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 09 Dec 2017 19:33:49 GMT</pubDate>
    <dc:creator>azhuk</dc:creator>
    <dc:date>2017-12-09T19:33:49Z</dc:date>
    <item>
      <title>Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4186#M428</link>
      <description>&lt;P&gt;Dear Colleagues,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe Zero Trust&amp;nbsp;(ZT) architecture is the next generation security model&amp;nbsp;for on-premise as well as hybrid and cloud-based systems. In my research of this relatively new topic, I found only a handful of resources available. To share what I know and to provide a baseline for your own exploration of ZT architecture, I created a simple website at &lt;A href="https://www.zerotrust.info" target="_self"&gt;www.zerotrust.info&lt;/A&gt;. Please feel free to visit and check out the list I compiled. Also please share with me any notable information sources that I might have not included in my modest catalog. Thank you very much!&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;Aleksandr&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:22:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4186#M428</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2023-10-09T08:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4191#M429</link>
      <description>&lt;P&gt;I presented a paper at RSA 2002 on the topic and it was written up in Information Security magazine.&amp;nbsp; Here are a few links.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Perimeter Defense in a World Without Walls:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.slideshare.net/DanHouser/perimeter-defense-in-a-world-without-walls" target="_blank"&gt;&lt;SPAN&gt;https://www.slideshare.net/DanHouser/perimeter-defense-in-a-world-without-walls&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="TextRun SCXO30324"&gt;&lt;SPAN class="NormalTextRun SCXO30324"&gt;"Beyond network perimeter defense: A 'submarine warfare' strategy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXO30324"&gt;&lt;SPAN class="NormalTextRun SCXO30324"&gt;",&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun Underlined SCXO30324"&gt;&lt;SPAN class="NormalTextRun SCXO30324"&gt;Information Security Magazine&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="TextRun SCXO30324"&gt;&lt;SPAN class="NormalTextRun SCXO30324"&gt;, Aug, 2002.&amp;nbsp; Last accessed 1-Dec-2017 at:&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="http://searchsecurity.techtarget.com/feature/Beyond-network-perimeter-defense-A-submarine-warfare-strategy" target="_blank" rel="noreferrer"&gt;&lt;SPAN class="TextRun SCXO30324"&gt;&lt;SPAN class="NormalTextRun SCXO30324"&gt;http://searchsecurity.techtarget.com/feature/Beyond-network-perimeter-defense-A-submarine-warfare-strategy&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="http://slideplayer.com/slide/4565710/" target="_blank" rel="noreferrer"&gt;&lt;SPAN class="TextRun SCXO191144253"&gt;&lt;SPAN class="NormalTextRun SCXO191144253"&gt;http://slideplayer.com/slide/4565710/&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="TextRun SCXO191144253"&gt;&lt;SPAN class="NormalTextRun SCXO191144253"&gt;&amp;nbsp;+&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://media.techtarget.com/searchSecurity/downloads/ISDF04_HouserPerimeter.ppt" target="_blank" rel="noreferrer"&gt;&lt;SPAN class="TextRun SCXO191144253"&gt;&lt;SPAN class="NormalTextRun SCXO191144253"&gt;https://media.techtarget.com/searchSecurity/downloads/ISDF04_HouserPerimeter.ppt&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think the essential mindshift is something I told my CISO at Cardinal Health around 2012 that pissed him off a little bit - "The internal corporate network is just the part of the Internet that we own, and it's a little less safe than Starbucks."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you stop thinking about your corporate network as trusted (because, truly, it shouldn't be trusted) then you arrive at the zero trust model.&amp;nbsp; Anywhere you have users clicking on things in their email and browser, that's not a trusted zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I think is more viable is what you can find in the Information Security Management article, which is an enclave model, a locked down fortress internal in the network where the crown jewels are stored.&amp;nbsp; To actually achieve this, however, you need to break credentials at the firewall to that enclave, and treat it like a different company.&amp;nbsp; If the backup, monitoring, patch management, orchestration, security monitoring, and change control accounts are the same in the unsecured zone and the enclave, then you're kidding yourself.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT size="3" color="black"&gt;-ddh&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT size="3" color="black"&gt;___________________&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT size="3" color="black"&gt;Daniel D. Houser, CISSP-ISSAP-ISSMP CISA CISM CSSLP CGEIT&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT size="3" color="black"&gt;Sr. Consultant, Security Strategy &amp;amp; Architecture&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT size="3" color="black"&gt;InfoSec Innovations&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT size="3" color="black"&gt;+1 614.805.4289&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT size="3" color="black"&gt;dan.houser@infosecinnovations.com&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT size="3" color="black"&gt;&lt;A href="https://twitter.com/secwonk?lang=en" target="_blank" rel="noopener noreferrer"&gt;@Secwonk&lt;/A&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri,sans-serif" size="2"&gt;&lt;SPAN&gt;&lt;FONT face="arial,sans-serif" size="2" color="#616161"&gt;Better Information Security Through: Science, Creativity, and Caring&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 08 Dec 2017 04:37:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4191#M429</guid>
      <dc:creator>dhouser</dc:creator>
      <dc:date>2017-12-08T04:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4195#M430</link>
      <description>&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much for&amp;nbsp;such a detailed response and for all the links that you provided! I sincerely appreciate it. I also love your assessment of what corporate network really is today. What a wonderful way to put it! May I quote you on the homepage of my new knowledge sharing portal &lt;A href="https://www.zerotrust.info" target="_self"&gt;www.zerotrust.info&lt;/A&gt;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the most potent business strategic thinking ideas I have found in my research and practice is to imagine that one's products are free. Such "preposterous" idea&amp;nbsp;makes one think really hard about how to deliver new value to one's customers. I think,&amp;nbsp;your message to the CISO is right on the money in the very same way--it forces the "now what?" approach to making a corporate infrastructure significantly more secure. Unpleasant as it might be, this is akin the muscle pain we feel after a good physical exercise. No pain, no gain. Thanks again!&lt;BR /&gt;&lt;BR /&gt;AZ&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Aleksandr Zhuk, DM, CISSP, BRMP, ITIL Expert&lt;BR /&gt;+1.212.380.8544&lt;/P&gt;&lt;P&gt;azhuk@azhuk.com&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2017 05:22:08 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4195#M430</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-12-08T05:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4197#M431</link>
      <description>&lt;P&gt;Sure.&amp;nbsp; Just to clarify, don't quote Cardinal's name.&amp;nbsp; I said the quote while I worked there but it wasn't because Cardinal Health had insecure networks.&amp;nbsp; In fact, they have a robust security program.&amp;nbsp; I think this is true of any firm.&amp;nbsp; Wherever you have users clicking on links in email &amp;amp; browsers, you have an attack surface.&amp;nbsp; Most organizations have flat networks, and you have an (N)^2 problem with that attack profile.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your typical Starbucks public WiFi network has maybe 30 nodes, with hugely variant security, but most&amp;nbsp;are likely not terrible, and auto-patch is quite common now on consumer desktops.&amp;nbsp; It's a low-utility network that really only does a few things - legal opt-in to T&amp;amp;Cs, metering, DHCP, DNS resolution, IP gateway services, content filtering, and some traffic isolation.&amp;nbsp; That's about it.&amp;nbsp; It's not uber high-security, but it's low-utility and low-volume, so small attack surface.&amp;nbsp; (N)^2 where nodes are 30 = 900.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Compare this small, relatively secure network with 50,000 or 100,000 endpoints on a typical large corporate network grown organically over 20+ years.&amp;nbsp; (N)^2 where nodes are 50,000 = 2,500,000,000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Worse, you'll typically find&amp;nbsp;one or more of these to be true:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;500 consultants using Goodness-only-knows-what as their compute platform&lt;/LI&gt;&lt;LI&gt;10 vendors a day connecting in&lt;/LI&gt;&lt;LI&gt;rogue switches &amp;amp; access points&lt;/LI&gt;&lt;LI&gt;VPN accounts that got handed out from time-to-time to non-employees&lt;/LI&gt;&lt;LI&gt;test/dev/QA parked in production network (yes, the _CODE_ is Dev, but the server &amp;amp; network are prod)&lt;/LI&gt;&lt;LI&gt;Shadow IT&lt;/LI&gt;&lt;LI&gt;IoT that walks in the door&lt;/LI&gt;&lt;LI&gt;Modems for fax support&lt;/LI&gt;&lt;LI&gt;a huge stack of firewall "open" requests, with an empty box of "close" requests&lt;/LI&gt;&lt;LI&gt;likely no tracking of ownership of firewall rules, or governance&lt;/LI&gt;&lt;LI&gt;rules that folks are afraid to turn off/ turn on&lt;/LI&gt;&lt;LI&gt;that one firewall where the last command is&amp;nbsp;PERMIT ANY ANY&lt;UL&gt;&lt;LI&gt;(I've found 2 in my career.&amp;nbsp; Yup, they tried to blacklist the Internet)&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;BYOC - Bring Your Own Computer&lt;/LI&gt;&lt;LI&gt;(likely unsecured) printers&lt;/LI&gt;&lt;LI&gt;those guys that installed a hypervisor&amp;nbsp;and are running a few rogue operating systems on their desktop&lt;/LI&gt;&lt;LI&gt;the&amp;nbsp;secret wink-wink-nudge-nudge proxy server that bypasses content controls&lt;/LI&gt;&lt;LI&gt;remote satellite offices where Jimmy has installed an extra connection on the network to (local ISP / hotel where they like to have meetings / shared conference room down the hall)&lt;/LI&gt;&lt;LI&gt;other remote satellite offices where the wiring closet is also used to store mops, lightbulbs, holiday decorations and cleaning supplies, and 18 people access it a month&lt;/LI&gt;&lt;LI&gt;pockets of desktop admin use&lt;/LI&gt;&lt;LI&gt;pockets of resistance to upgrade, using old crap&lt;UL&gt;&lt;LI&gt;that one mission critical app that runs on Windows 2000/ RedHat 6.2/ Oracle 8i-Rel 3/ Microsoft Bob&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;patching exclusion lists&lt;/LI&gt;&lt;LI&gt;endpoint compliance reporting exclusion lists/errors in reporting&lt;/LI&gt;&lt;LI&gt;that special laptop/server/switch/router/tablet for the CFO or COO that isn't really locked down&lt;/LI&gt;&lt;LI&gt;PCs that 40 executives have installed in their homes that remote VPN from their home network&lt;/LI&gt;&lt;LI&gt;likely huge holes in firewalls internally&lt;/LI&gt;&lt;LI&gt;facilities &amp;amp; physical security devices&lt;UL&gt;&lt;LI&gt;you know, the ones where they periodically install DHCP services and start handing out addresses?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;SCADA milling machines, robots, conveyors, pumps, actuators, valves, etc.&lt;/LI&gt;&lt;LI&gt;ATMs &amp;amp; POS vending machines&lt;/LI&gt;&lt;LI&gt;cafeteria point-of-sale&lt;/LI&gt;&lt;LI&gt;third party devices hosted on your network&lt;/LI&gt;&lt;LI&gt;hundreds of third parties that connect into your infrastructure to perform support &amp;amp; maintenance&lt;/LI&gt;&lt;LI&gt;DevOps teams likely able to download &amp;amp; install as needed&lt;/LI&gt;&lt;LI&gt;broad use of collaboration sharing technologies where the user clicks "Share my Desktop"&lt;/LI&gt;&lt;LI&gt;likely pockets of internet-facing test&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;That creates quite a mosh pit.&amp;nbsp; While much of it is armored, in the aggregate, it's like a flotilla of mixed battleships, destroyers, tankers, cruise ships, bass boats and leaky sailboats.&amp;nbsp; LOTS of surface area, lots of targets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-ddh&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2017 07:00:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4197#M431</guid>
      <dc:creator>dhouser</dc:creator>
      <dc:date>2017-12-08T07:00:25Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4207#M432</link>
      <description>&lt;P&gt;Hello Daniel,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your permission to use your words (no company names--of course) and for further explanation of your Starbucks metaphor! Very well done! Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;AZ&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2017 15:07:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4207#M432</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-12-08T15:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4217#M433</link>
      <description>&lt;P&gt;Great posts.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why should I trust you website then?:P&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One of the deep down fundamental problems of the 'Zero Trust' model(and just for clarity I think it's one of the best paradigms around is keeping everything operating while moving&amp;nbsp;on to it, nothing kills an initiative like stopping services eve if borking &lt;EM&gt;'The old expensive thing that sits in the corner and &lt;U&gt;Spoils Everything&lt;/U&gt; if it isn't kept fed with copious unsigned PE files and access databases via&amp;nbsp;NetBEUI...TM' &lt;/EM&gt;might be a blessing in disguise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Google's BeyondCorp framework is probably the most talked about vendor neutral effort, and as a model I think makes a lot of sense&amp;nbsp;&lt;A href="https://cloud.google.com/beyondcorp/" target="_self"&gt;https://cloud.google.com/beyondcorp/&lt;/A&gt;. It's also a pretty good antidote for the Zero (Rabid) Trust Person who will soundbite it in meetings and then build layers of evermore tenuous argument on top of knowing the buzzword and trying to panic someone into buying/committing/etc into making something 'Secure' but really failing to understand what they are doing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"And, now &amp;nbsp;by the power of Opsware's global root access I shall now put all the HP-UX boxen into trusted mode, It is done, we are impregnable!"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Impressive... could you just connect to one of them so we can take a look?"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"..."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2017 16:17:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4217#M433</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2017-12-09T16:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4218#M434</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/797288093"&gt;@Early_Adopter&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your great comments and the jolly tone! You are right--don't trust my website at least at the offset!&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.isc2.org/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; Thank you for the &lt;SPAN&gt;Google's BeyondCorp link! The portal is a treasure trove of great research information. Have a great weekend!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;All the best!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-Aleksandr&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Dec 2017 19:33:49 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/4218#M434</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2017-12-09T19:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/38414#M4838</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/60764811"&gt;@azhuk&lt;/a&gt;Does your web site still exist?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 20:42:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/38414#M4838</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-08-24T20:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/38416#M4839</link>
      <description>&lt;P&gt;John&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;August 2020, NIST has just published Special Publication, &lt;STRONG&gt;&lt;A href="https://csrc.nist.gov/publications/detail/sp/800-207/final" target="_blank" rel="noopener"&gt;SP 800-207, Zero Trust Architecture&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;and the &lt;A href="https://www.nccoe.nist.gov/" target="_blank" rel="noopener"&gt;National Cybersecurtiy Center of Excellence (NCCOE)&lt;/A&gt; has released a public draft of the in-development&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;&lt;A href="https://www.nccoe.nist.gov/library/implementing-zero-trust-architecture" target="_blank"&gt;Implementing a Zero Trust Architecture&lt;/A&gt;.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 21:42:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/38416#M4839</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-08-24T21:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/38417#M4840</link>
      <description>Thanks a lot for the tip CraginS! I really appreciate it.</description>
      <pubDate>Mon, 24 Aug 2020 22:18:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/38417#M4840</guid>
      <dc:creator>azhuk</dc:creator>
      <dc:date>2020-08-24T22:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Zero Trust (ZT) Security Architecture Model - Looking for and Sharing Sources of Knowledge</title>
      <link>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/38418#M4841</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1396406497"&gt;@Craig&lt;/a&gt;&amp;nbsp; Thanks very much, yes, I have downloaded the ZT NIST SP.800-209 latest version.&amp;nbsp; It is provides a good baseline and some good use cases.&amp;nbsp; I am current researching the subject, and comparing various vendors Points of View (PoV) in terms what they can assist organisations on their journey.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Good BeyondCorp is a proprietary one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you think now that Digital Transformation has transformed many organisations into the hybrid cloud situation, but in doing so, the attack surface has increased, and the associated risks have risen along with the fact the data is distributed all over the place.&amp;nbsp;&amp;nbsp; Traditional methods cannot cope with this type of situation, these days.&amp;nbsp; Most organisations are thinking about ZT, apparently 78% of them are thinking along those lines statistically.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The second paper looks very good too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2020 00:27:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Zero-Trust-ZT-Security-Architecture-Model-Looking-for-and/m-p/38418#M4841</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-08-25T00:27:33Z</dc:date>
    </item>
  </channel>
</rss>

