Using a Zero-Trust Framework to Make Sure Everyone is Part of Security
It would be pretty cool if we had a framework available to us that validated a user’s identity, validated the machine they were using, and applied some policy and context for everything they tried to access. A model that would move the perimeter to anywhere an access decision is made. Oh, wait, we do. It’s often referred to as zero trust.