Are you using a Zero Trust security model yet? The Zero Trust approach assumes that every time a device accesses your systems it could be a threat. The user must provide multi-factor authentication each time they log on.
This makes a lot of sense in theory, yet also introduces a lot of challenges. An over-zealous set of protections will slow down productivity and cause endless complaints. Too much trust opens you up to more threats in a cloud-first world.
This theme will help you frame your own Zero Trust definitions and balance the risks and rewards of the approach.
- Zero Trust Journey
- Identity-led security