ZERO
TRUST
“Just because you're paranoid doesn't mean they aren't after you.”
Joseph Heller, Catch 22
Boaz@komodosec.com
Traditional Security
Enterprise
Network
Architecture
The Goal Of Zero Trust
ELIMINATE TRUST IN
THE SYSTEM
TRUST GETS
EXPLOITED
Zero Trust Enterprise
Architecture
Zero Trust Architecture
Core Elements Of Zero Trust
Verify The User Verify Their Device Limit Access and
Privileges
Becoming Trustless
(without NZT)
How to
Become
Trustless
Monitor Monitor the zero trust environment, in
detail, with security analytics
Architect Architect zero trust microperimeters
Map Map the acceptable routes for sensitive
data access and egress
Identify Identify your sensitive data at rest and in
motion
Problems Organizations will Face
Technical
Debt
Will require
new
technologies
Legacy
Systems
Will require
wrappers
Peer-to-Peer
Technologies
windows 10
updates
What’s next?
More Reading…
• Beyond Corp – Google
• Zero Trust – Microsoft
• Zero Trust – Palo Alto
• Why Zero Trust is Unrealistic

Zero Trust