Skip to content
2 min read

In the world of IT, Zero Trust is coming - are you ready?

In the world of IT, Zero Trust is coming - are you ready?

This week, Microsoft has made a significant investment in a Zero Trust company known as Rubrick. Zero trust makes the assumption that such perimeter security approaches are destined to fail and that systems have already been penetrated.  You can then operate to mitigate the damage and the risk.

Zero Trust Principles

The Zero Trust (ZT) model of security is showing a great deal of promise... While Zero Trust has traditionally been used as a network security model, the principles also apply to data security and security architecture in general. ZT extends the principle of "least privilege" to its ultimate conclusion: Trust no one and grant the least privilege so that once a user's identity is verified, they only get access to the role they're assigned -- nothing more. It is the opposite of the prevailing "trust but verifies" model of access control that allows users with basic credentials to have broad access to digital assets. Instead, ZT takes a "verify but trust" approach that closes off access until the user's identity is confirmed, and then only grants the minimal access privileges to complete the assigned task.

You can read more about the acquisition here: Microsoft Zero Trust