Nicky Lim’s Reviews > Zero Trust Networks: Building Secure Systems in Untrusted Networks > Status Update

Nicky Lim
Nicky Lim is on page 40 of 238
Zero trust networks need good threat model, strong authentication throughout, PKI, principle of least privilege, variable trust, control and user plane separation
Oct 23, 2019 01:09AM
Zero Trust Networks: Building Secure Systems in Untrusted Networks

flag

Nicky’s Previous Updates

Nicky Lim
Nicky Lim is on page 20 of 238
Perimeter model assumes bad actors stay out of internal soft belly, which is doomed to failure. Dialer-based "phoning home" attacks introduced due to lack of outbound security for performance reasons.

History of Perimeter model, VPN and NAT
Oct 18, 2019 10:03AM
Zero Trust Networks: Building Secure Systems in Untrusted Networks


No comments have been added yet.