Please enable JavaScript.
Coggle requires JavaScript to display documents.
Zero Trust Model - Coggle Diagram
Zero Trust Model
Foundational Pillars of Zero Trust
Apps
Shadow IT
Manage permission of all apps including those not center managed
Data
Classify data
SEcure the data via encryption
Devices
Monitor the device health
Infrastructure
assess and secure your infrastructure
ID
verify the id
Networks
segment your network
Guiding Principles
Least Priviledge access
Just in Time access
Just Enough Access
Assume Breach
Segement access to the network
Encrypt Data
Detect Threats
Verify
Authenticate and Authjorize always
Encryption
Data in Transit
data going through a network
encrypt on the app layer via HTTPS
Data in use
data in Ram or CPU
enclave lockbox
Data at Rest
data stored on a device
encrypt it