For Security & Risk Professionals

No More Chewy Centers: The Zero Trust Model Of Information Security

    Why Read This Report

    There's an old saying in information security: "We want our network to be like an M&M, with a hard crunchy outside and a soft chewy center." For a generation of security and risk (S&R) professionals, this was the motto we grew up with. It was a motto based on trust and the assumption that malicious individuals wouldn't get past the "hard crunchy outside." In today's threat landscape, this is no longer an effective way of enforcing security. Once an attacker pierces the shell, he has access to all the resources in our network. We've built strong perimeters, but well-organized cybercriminals have recruited insiders and developed new attack methods that easily bypass our current security protections. To confront these threats, S&R pros must eliminate the soft chewy center by making security ubiquitous throughout the network, not just at the perimeter. To help S&R pros do this effectively, in 2009, we developed a new information security model, called the Zero Trust Model of information security. Since then, we have seen its widespread acceptance and adoption, from cloud and security vendor powerhouses to manufacturers and retailers. This report explains the vision and key concepts of the Zero Trust Model.
    US $499
    Add To Cart
    Become A Client

    Get objective, pragmatic guidance that helps you make tough decisions and succeed in a complex world. Contact us to learn more.

    Already A Client?
    Log in to read this document.


    • Wake Up: You Must Adapt To Sophisticated And Cunning Adversaries
    • The Trust Model Is Broken
    • No More Chewy Centers: Understanding Zero Trust
    • Zero Trust Requires Network Analysis And Visibility
    • Zero Trust Will Enable The Digital Business

      Zero Trust Is Not A One-Time Project
    • Supplemental Material
    • Related Research Documents