‘Defense in Layers’ — Zero Trust Applied to Your Cybersecurity Posture

David Matousek
Product Cybersecurity

--

“Defense In Layers” in the Enterprise

Image by Jan Alexander from Pixabay

Part 3 of the series ‘Defense In Layers’. Part 1: ‘Defense In Layers’ The Framework & Part 2: ‘Defense in Layers’ — The Exercise. Please support me by following me on Medium.

Cybersecurity teams are being called upon to provide roadmaps to ‘Zero Trust.’ Cybersecurity leaders will not be successful if they just buy a product and implement it across the organization. ‘Zero Trust’ principles need to be applied across all cybersecurity domains. Applying ‘Zero Trust’ takes reflection, time, and continuous monitoring.

I can’t tell you every security capability and how to prioritize security initiatives for your organization. What I can do is provide my three ‘Top of Mind’ security capabilities and risk posture measures.

When I reflect on the ‘Zero Trust’ model, as defined in the NSA document “Embracing a Zero Trust Security Model,” I see connections to each of the six cybersecurity postures. By applying the three principles of ‘zero trust’ to the six postures of cybersecurity, we can take the first steps toward a Zero Trust cybersecurity posture.

“Zero Trust is a security model, a set of system design principles, and a coordinated cybersecurity and system management strategy based on an

--

--

David Matousek
Product Cybersecurity

Cybersecurity Product Manager, Building Better Security for Customers, Developers, & Stakeholders