Issue link: https://insights.oneneck.com/i/1458399
42 Data Center & Hybrid Cloud Security For Dummies, Palo Alto Networks Special Edition These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Tag-based policies also enable the flexibility to apply different rules to the same server based on tags that define its role on the network, the operating system, or the different kinds of traffic it processes. Tags can even be used to apply specific policies to workloads based on regulatory compliance standards. Because tags are applied to workloads as part of the infrastruc- ture provisioning process, it's important to agree on a unified system for tagging across your organization. Key stakeholders from infrastructure, security, networking, and application teams should all agree to a tagging methodology and nomenclature to avoid confusion and miscommunication. Tagging methodologies can also carry over to public cloud resources. FIGURE 3-3: Tags abstract policy away from specific IP addresses. THE TRUTH ABOUT ZERO TRUST As Zero Trust has become more widely known, so too have the mis- conceptions around what Zero Trust is and how to achieve a Zero Trust network architecture. Here are four prevalent myths about Zero Trust and the truths behind them. Myth 1: The goal of Zero Trust is to make a system trusted. Truth: The goal of Zero Trust is to eliminate the concept of inherent trust so that you can strategically protect what's important to your organization.