What is zero trust?

Zero trust

What is zero trust?

The zero trust security model uses identity and context information to continually verify trust before granting least-privilege access for users, devices, apps, networks, and clouds.

What are the zero trust principles?

Continually verify identity at every access decision; provide least-privilege access for users, devices, networks, and apps; and respond quickly to threats before they spread.

Why should you implement a zero trust security model?

Zero trust adoption increases security resilience for organizations in every industry. As zero trust maturity rises, it is easier to achieve security outcomes such as securing user access to applications with multi-factor authentication (MFA) and security service edge (SSE). This results in improving user experience, protecting on-premises networks with segmentation and cloud apps with micro-segmentation, and enhancing threat detection.

Which technologies enable zero trust?

First and foremost, zero trust isn't a single product or technology. It's a security strategy that is best implemented by keeping an organization's business operations, risks, and security outcomes in mind. Although there are various paths to achieving zero trust maturity, most organizations prioritize deployment of technologies such as multi-factor authentication (MFA), device posture checks, Zero Trust Network Access (ZTNA), and macro- and microsegmentation as they implement zero trust security.

Where do you start with zero trust?

First, continually verify identity trust for users, devices, apps, networks, and clouds. Next, apply least-privilege access with macro- and microsegmentation. Finally, respond to threats with extended detection and response (XDR).

How do you set up a zero trust architecture?

Most organizations use frameworks such as CISA's maturity model or NIST's 800-200. Zero Trust Design Frameworks and Cisco Security Reference Architecture also offer key guidance.

Video

How Cisco Enables Zero Trust

Learn how Cisco enables zero trust access controls into the fabric of multi-environment IT across users, devices, apps, networks, and clouds.

Webinar

Your Zero Trust Roadmap: Five Steps to Secure User Access to Applications

Secure user and device access to apps with our five-phase plan for moving from MFA to full zero trust.

Product

Cisco Duo Multi-Factor Authentication (MFA)

Duo enables zero trust adoption with strong MFA, single sign-on (SSO), VPN-less remote access, device trust, and more.