TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

What Is Zero Trust Architecture and Security?

4 pointsby CKMoalmost 2 years ago

2 comments

austin-cheneyalmost 2 years ago
This is my attempt to achieve Zero Trust in a way that greatly exceeds the Microsoft and US Army Zero Trust specifications:<p><a href="https:&#x2F;&#x2F;github.com&#x2F;prettydiff&#x2F;share-file-systems&#x2F;blob&#x2F;master&#x2F;documentation&#x2F;decentralization.md">https:&#x2F;&#x2F;github.com&#x2F;prettydiff&#x2F;share-file-systems&#x2F;blob&#x2F;master...</a>
CKMoalmost 2 years ago
I’m a traditional network person. Is there a way to avoid zero trust?<p>It’s possible. Here’s a way to determine if the organization can ignore zero trust altogether:<p>- There is no shift to the cloud, now or in the future<p>- The supply chain is wholly owned by the organization or provided by vendors that allow for full auditing and verification<p>- All assets are self-hosted and managed by the organization<p>- All user devices are provided and strictly managed by the organization<p>- All users can be expected to connect from within a pre-determined physical location, not through a VPN<p>- All users are completely trustworthy at all times with no financial incentive to become compromised<p>- All users are well-trained in cybersecurity concepts and would never be negligent insiders<p>- All acquisitions and mergers are extremely audited for the above requirements, or assets are not co-mingled until the above requirements are met