It’s been quite some time since I’ve posted anything, so let’s do a thing.
This is a whitepaper I wrote about ten months ago that grew out of an effort to establish a foundational, functional, understanding of what zero trust looks like. I know the term is being overloaded to mean all kinds of things which is a bummer. Anyhow, here’s an honest and hopefully useful take. I backed my assertions with citations and all that sort of stuff. If you want to go down the rabbit hole it’s all there in the bibliography, and it’s some great reading to be honest. I invite you to dig a little deeper and check out some of that material.
Also, you know what? Using big honking firewalls to macrosegment legacy application traffic in on-prem datacenters is totally fine and valid don’t @ me. 🙂
May you care for yourself with ease,