so fundamental. Number four
every device, user and network flow must be authenticated and authorized.
Now real quick example of this.
How art imitates life. My youngest daughter is still in daycare, and no matter how many times I've held conversations with the receptionist
and how friendly we have become, I cannot access the lobby, the infant or toddler hallway, or even the classrooms without authenticating with my own very pin.
Now security doesn't stop or get relaxed after I passed the lobby area, right, But it continues throughout all the zones in that daycare facility.
This authentication is also required by trusted staff and not just
parent's or grandparent's. And that's what we see with zero trust.
Fundamental Number five
policies must be dynamic and calculated from any source or as many sources
of data points as possible.
So right before my wife gets on the road, she always checks Google maps to avoid traffic jams and identifies the safest and quickest way to our destination.
She isn't relying on our own judgment in the morality with our city to get her from point A to point B,
she doesn't allow her own knowledge and experience to determine what route she takes.
She considers other sources,
which results in a safer and better job experience for her and our Children.
And so zero trust models wanted to the same one allow nor denying access for our users,
devices, applications and our network traffic.
So let's look back at what we covered in this section. We discussed fundamentals 34 and five,
and those fundamentals are network. Locality is not sufficient
for deciding trust in a network.
Every device, user and network flow must be authenticated, unauthorized
and policies must be dynamic and calculated from his many sources of data as possible.
Now we also talked about ze scaler and how they embrace zero trust into their security products.
Primarily these girl private access,
much more head stay tuned.
So thank you so much for staying with me. We're back with another pop quiz. Just another learning check
reference in this section that we just went over.
So our first question here is, what zone does traditional networks place? Sensitive Data
Does e skater claim that there's the scale of private access? Solution can replace traditional virtual private networks, and number three, how many sources of data should be used to calculate data to create policies. All of this we touched on. So you should have a pretty good idea of what those answers are.
So let's go ahead and take a look at what I got on the next slide.
So what we've got for our first question,
what zone does traditional networks play? Sensitive data? It's the privilege zones, right? We talked about that in our analogy. Um, where Ah privilege zone, if you were in a home, was probably your bedroom, and that's where your wallet would be. Your your medical records potentially would be, um,
and that sensitive data stays in an area where is it's very privileged, and we see that on our traditional networks today,
where we have P. C I and Hip A data in a privilege zone.
We move on to question number two. Does the scaler claim that their Izzy's killer private access solution can replace traditional
virtual private networks? And the answer is yes. Again, it's a solution that I think you all should check out when it comes to zero trust. You know, we focus a lot on how third party vendors, whether it's with target home depot were breached and that caused
reputational damage, financial loss
remote access solutions that weren't secure and put a lot of trust in those third parties. We move on to question number three. How many sources of data should be used to calculate data to create policies and in zero trust as many as possible. We used the analogy in the storytelling
about going through a drive through
and making sure that you didn't have your cashier. Um, you know, check your bag, but you would check it as well, or you would check it together. So Maur more vantage points, More data points. More sources of data on a CZ, many as possible is gonna help you
come to the best conclusion when you come to creating policies
that deny or allow access. Thanks so much for sticking with me.