Nicky Lim’s Reviews > Zero Trust Networks: Building Secure Systems in Untrusted Networks > Status Update
Nicky Lim
is on page 40 of 238
Zero trust networks need good threat model, strong authentication throughout, PKI, principle of least privilege, variable trust, control and user plane separation
— Oct 23, 2019 01:09AM
Like flag
Nicky’s Previous Updates
Nicky Lim
is on page 20 of 238
Perimeter model assumes bad actors stay out of internal soft belly, which is doomed to failure. Dialer-based "phoning home" attacks introduced due to lack of outbound security for performance reasons.
History of Perimeter model, VPN and NAT
— Oct 18, 2019 10:03AM
History of Perimeter model, VPN and NAT

