Issue link: https://insights.oneneck.com/i/1458399
CHAPTER 3 Delivering Consistent Security Using Zero Trust 33 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Chapter 3 IN THIS CHAPTER » Seeing your entire protect surface » Segmenting data centers and hybrid cloud environments » Migrating security policies dynamically with hybrid cloud workloads Delivering Consistent Security Using Zero Trust C onventional security models operate on the outdated assumption that you can trust everything inside your net- work. However, given the increased sophistication of attacks and insider threats, you need new security measures to stop them from spreading once they're inside. Because traditional security models are designed to protect your perimeter, threats that get inside your network often go undetected and are free to morph and move wherever they choose to extract sensitive busi- ness data. In the digital world, trust is a vulnerability. A Zero Trust approach to security helps prevent data breaches by eliminating the concept of inherent trust in an organization's data center or hybrid cloud environment. Rooted in the princi- ple of "never trust, always verify." The key to adopting a Zero Trust approach in data centers and hybrid cloud environments lies in leveraging a multi-layered network security posture that delivers consistent network visibility, segmentation and micro- segmentation, and threat detection and response across physi- cal, virtual, and containerized infrastructures. Preventing lateral movement relies on security that is context-based, dynamic, and integrated throughout your organization.