SlideShare a Scribd company logo
3
Most read
4
Most read
Zero Trust Architecture
(ZTA)
ENHANCING CYBERSECURITY WITH A “NEVER TRUST,
ALWAYS VERIFY” APPROACH
Introduction to Zero Trust
Architecture
What is Zero Trust?
• A security model where no one is trusted by default.
• Every action is authenticated and authorized.
Why is it important?
• Modern threats, like insider breaches and hackers, make
traditional “trusted” systems vulnerable.
• It’s especially critical today with remote work and cloud systems.
Traditional Security vs. Zero Trust
Traditional Perimeter-Based Security:
• Assumes that everything inside the network is trusted.
• Relies heavily on firewalls, VPNs, and perimeter defenses.
Zero Trust Approach:
• No implicit trust; verifies every request from every user, device, and
network.
• Verifies every person or device, no matter if they’re inside or
outside the network.
Core Principles of Zero Trust
Architecture
1. Verify Explicitly
• Continuous Authentication & Authorization: Each user and device must be authenticated and authorized every
time they attempt to access a resource. This includes multi-factor authentication (MFA), device verification, and
other checks.
3. Assume Breach
• Micro-Segmentation: The network is divided into smaller zones, each with its own security policies, to limit the
damage of a breach. This limits lateral movement within the network.
• Monitoring & Logging: Continuous monitoring of all traffic, behaviors, and access patterns is essential. This
helps detect anomalies that may indicate a breach or malicious behavior.
• Containment and Response: Quickly containing any breaches and responding to incidents reduces their
potential impact.
2. Least Privilege Access
• Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC): Access should be restricted based
on the role, context, or attributes of the user or device. This prevents over-privileged access to sensitive resources.
• Dynamic Policy Enforcement: Policies should adapt to changing risk levels, such as user location, device health, and
real-time threat intelligence.
Components of Zero Trust
Architecture
1.Identity and Access Management (IAM):
Strictly verifies the identity of all users, devices, and applications accessing the network.
IAM controls who can access specific resources, ensuring that each user has the correct
permissions based on their role
2.Multi-Factor Authentication (MFA):
MFA adds an extra layer of security by requiring multiple forms of verification, making it
harder for unauthorized users to gain access.
3.Microsegmentation:
Microsegmentation breaks down a network into smaller zones, limiting access to
sensitive data and containing potential threats.
4.Continuous Monitoring:
Continuously monitors network activity and user behavior to detect anomalies in real-
time.
Thank you
Two Content Layout with Table
• First bullet point here
• Second bullet point here
• Third bullet point here
Class Group 1 Group 2
Class 1 82 95
Class 2 76 88
Class 3 84 90
Add a Slide Title - 1
Add a Slide Title - 2
Add a Slide Title - 3
Zero Trust Architecture Zero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust Architecture
Add a Slide
Title - 4
Add a Slide
Title - 5
Click icon to add picture

More Related Content

Similar to Zero Trust Architecture Zero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust Architecture (20)

PPTX
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
prasanna212623
 
PDF
zero trust - how to build zero trust.pdf
AliAlwesabi
 
PPTX
zerotrustmodelpresentation-200107094517.pptx
niyazhasanov35
 
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
GenericName6
 
PDF
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
null - The Open Security Community
 
PPTX
Zero Trust and Data Security
Career Communications Group
 
PDF
Understanding Zero Trust Network Security_ A Comprehensive Guide.pdf
shitolesonam7
 
PPTX
Zero Trust Network Access
Er. Ajay Sirsat
 
PPTX
Zero-Trust-Architecture-Reimagining-Network-Security.pptx
yash98012
 
PDF
Understanding the Zero Trust Architecture Market: A Comprehensive Overview
MarkAdams493291
 
PDF
Zero Trust Network Security- A New Era of Cyber Defense.pdf
jvinay0898
 
PPTX
What is Zero Trust
Okta-Inc
 
PDF
What is the Zero Trust Security Model, How Does It Work, and Why Is It Import...
Dina G
 
PDF
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Cristian Garcia G.
 
PPTX
Zero Trust Model
Yash
 
PPTX
What is zero trust model (ztm)
Ahmed Banafa
 
PDF
Zero trust architecture and MIS.pdf
Central Pattana Public Company Limited (CPN)
 
PDF
Zero Trust Networks Evan Gilman Doug Barth
xovaniparpov15
 
PDF
Zero Trust Networks Evan Gilman Doug Barth
buracakerina41
 
PDF
The Zero Trust Security Model for Modern Businesses!
Caroline Johnson
 
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
prasanna212623
 
zero trust - how to build zero trust.pdf
AliAlwesabi
 
zerotrustmodelpresentation-200107094517.pptx
niyazhasanov35
 
microsoft-cybersecurity-reference-architectures (1).pptx
GenericName6
 
Beyond Boundaries-The Power of Zero Trust Networking By Mohammed Danish Amber...
null - The Open Security Community
 
Zero Trust and Data Security
Career Communications Group
 
Understanding Zero Trust Network Security_ A Comprehensive Guide.pdf
shitolesonam7
 
Zero Trust Network Access
Er. Ajay Sirsat
 
Zero-Trust-Architecture-Reimagining-Network-Security.pptx
yash98012
 
Understanding the Zero Trust Architecture Market: A Comprehensive Overview
MarkAdams493291
 
Zero Trust Network Security- A New Era of Cyber Defense.pdf
jvinay0898
 
What is Zero Trust
Okta-Inc
 
What is the Zero Trust Security Model, How Does It Work, and Why Is It Import...
Dina G
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Cristian Garcia G.
 
Zero Trust Model
Yash
 
What is zero trust model (ztm)
Ahmed Banafa
 
Zero trust architecture and MIS.pdf
Central Pattana Public Company Limited (CPN)
 
Zero Trust Networks Evan Gilman Doug Barth
xovaniparpov15
 
Zero Trust Networks Evan Gilman Doug Barth
buracakerina41
 
The Zero Trust Security Model for Modern Businesses!
Caroline Johnson
 

Recently uploaded (20)

PDF
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
PDF
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
PPTX
site survey architecture student B.arch.
sri02032006
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PDF
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
PPTX
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
PDF
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
PDF
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
PPTX
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
PPTX
Thermal runway and thermal stability.pptx
godow93766
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PPTX
drones for disaster prevention response.pptx
NawrasShatnawi1
 
PDF
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
PPTX
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
PDF
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PPTX
Hashing Introduction , hash functions and techniques
sailajam21
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PPTX
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
PPT
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
Statistical Data Analysis Using SPSS Software
shrikrishna kesharwani
 
Book.pdf01_Intro.ppt algorithm for preperation stu used
archu26
 
site survey architecture student B.arch.
sri02032006
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Unified_Cloud_Comm_Presentation anil singh ppt
anilsingh298751
 
265587293-NFPA 101 Life safety code-PPT-1.pptx
chandermwason
 
Water Design_Manual_2005. KENYA FOR WASTER SUPPLY AND SEWERAGE
DancanNgutuku
 
BioSensors glucose monitoring, cholestrol
nabeehasahar1
 
MPMC_Module-2 xxxxxxxxxxxxxxxxxxxxx.pptx
ShivanshVaidya5
 
Thermal runway and thermal stability.pptx
godow93766
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
drones for disaster prevention response.pptx
NawrasShatnawi1
 
ARC--BUILDING-UTILITIES-2-PART-2 (1).pdf
IzzyBaniquedBusto
 
UNIT DAA PPT cover all topics 2021 regulation
archu26
 
6th International Conference on Machine Learning Techniques and Data Science ...
ijistjournal
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
Hashing Introduction , hash functions and techniques
sailajam21
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
Break Statement in Programming with 6 Real Examples
manojpoojary2004
 
Oxygen Co2 Transport in the Lungs(Exchange og gases)
SUNDERLINSHIBUD
 
Ad

Zero Trust Architecture Zero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust ArchitectureZero Trust Architecture

  • 1. Zero Trust Architecture (ZTA) ENHANCING CYBERSECURITY WITH A “NEVER TRUST, ALWAYS VERIFY” APPROACH
  • 2. Introduction to Zero Trust Architecture What is Zero Trust? • A security model where no one is trusted by default. • Every action is authenticated and authorized. Why is it important? • Modern threats, like insider breaches and hackers, make traditional “trusted” systems vulnerable. • It’s especially critical today with remote work and cloud systems.
  • 3. Traditional Security vs. Zero Trust Traditional Perimeter-Based Security: • Assumes that everything inside the network is trusted. • Relies heavily on firewalls, VPNs, and perimeter defenses. Zero Trust Approach: • No implicit trust; verifies every request from every user, device, and network. • Verifies every person or device, no matter if they’re inside or outside the network.
  • 4. Core Principles of Zero Trust Architecture 1. Verify Explicitly • Continuous Authentication & Authorization: Each user and device must be authenticated and authorized every time they attempt to access a resource. This includes multi-factor authentication (MFA), device verification, and other checks. 3. Assume Breach • Micro-Segmentation: The network is divided into smaller zones, each with its own security policies, to limit the damage of a breach. This limits lateral movement within the network. • Monitoring & Logging: Continuous monitoring of all traffic, behaviors, and access patterns is essential. This helps detect anomalies that may indicate a breach or malicious behavior. • Containment and Response: Quickly containing any breaches and responding to incidents reduces their potential impact. 2. Least Privilege Access • Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC): Access should be restricted based on the role, context, or attributes of the user or device. This prevents over-privileged access to sensitive resources. • Dynamic Policy Enforcement: Policies should adapt to changing risk levels, such as user location, device health, and real-time threat intelligence.
  • 5. Components of Zero Trust Architecture 1.Identity and Access Management (IAM): Strictly verifies the identity of all users, devices, and applications accessing the network. IAM controls who can access specific resources, ensuring that each user has the correct permissions based on their role 2.Multi-Factor Authentication (MFA): MFA adds an extra layer of security by requiring multiple forms of verification, making it harder for unauthorized users to gain access. 3.Microsegmentation: Microsegmentation breaks down a network into smaller zones, limiting access to sensitive data and containing potential threats. 4.Continuous Monitoring: Continuously monitors network activity and user behavior to detect anomalies in real- time.
  • 7. Two Content Layout with Table • First bullet point here • Second bullet point here • Third bullet point here Class Group 1 Group 2 Class 1 82 95 Class 2 76 88 Class 3 84 90
  • 8. Add a Slide Title - 1
  • 9. Add a Slide Title - 2
  • 10. Add a Slide Title - 3
  • 13. Add a Slide Title - 5 Click icon to add picture