What is Zero Trust Network Architecture (ZTNA)?

Jul 28, 2023

Overview 

In an era of a rapidly expanding digital landscape and day-to-day advancing cyber threats, traditional security models are struggling to keep pace. As a response to this evolving threat landscape, the Zero Trust Network Architecture has emerged as a compelling approach to protecting critical resources and data. This article explores the principles behind the Zero Trust model and discusses its advantages and disadvantages for organizations that seek to adopt this paradigm shift in cybersecurity.

What is Zero Trust?

“Zero Trust” is a cyber-security model first introduced by Jon Kindervag of Forrester in 2010. This model required the network to “never trust, always verify”. [1]  Zero Trust requires all users and devices to authenticate themselves and receive authorization before they can access any services or data. It's similar to the network having a series of security checkpoints where you must present your ID and request authorization at each one.

What is Zero Trust Network Architecture (ZTNA)?

Zero Trust Network Architecture (ZTNA) is an IT network that utilizes zero trust security principles. ZTNA focuses on providing strict access controls and verifying every device and user trying to access a network or a system. Users and devices that want to access resources of a network should pass strict authentication and authorization processes whether inside or outside the network.

When it comes to traditional network security approaches, a perimeter-based strategy is frequently used. For instance, the majority of organizations have trust in....

Author

Vidusha Shalani, H.M.H Sanjeewa, Chirath De AlwisUmeshika De Seram, Jethendri Wathsala Perera,
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023