File tree Expand file tree Collapse file tree 1 file changed +5
-5
lines changed
Expand file tree Collapse file tree 1 file changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -470,11 +470,11 @@ The term "zero trust" was coined by the analyst firm Forrester in
4704702009, and continues to be widely used in the industry today. The
471471central idea behind zero trust is that, by default, every device and
472472user should be untrusted. Each user and device then needs to
473- authenticate itself to a precise set of services. There is no blanket
474- "trust this device to access anything" policy. Zero trust stands in
475- contrast to the old "perimeter security" model in which there is the
476- idea of a trusted region within a perimeter defined by firewalls and
477- an untrusted region outside the perimeter.
473+ authenticate itself to gain access to a precise set of services. There
474+ is no blanket "trust this device to access anything" policy. Zero
475+ trust stands in contrast to the old "perimeter security" model in
476+ which there is the idea of a trusted region within a perimeter
477+ protected by firewalls and an untrusted region outside the perimeter.
478478
479479Zero trust is sufficiently well accepted that NIST has written a
480480specification (see Further Reading below) which provides this helpful
You can’t perform that action at this time.
0 commit comments