Cyber Bites

Zero Trust 4/4: Networks

Network Security
A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers networks.
Implementation of security policies is supported by a commercial-grade firewall, which prevents unauthorized entry as an inspection gateway for in and outbound traffic. For remote and home users, the inclusion of an always-on Gateway Virtual Private Network (VPN) further safeguards movement of network data by creating a dedicated tunnel for traffic to travel through for secure, remote access of applications, services, and data from anywhere.
To meet cyber regulations, Remote Desktop Protocol (RDP) access must be secured with Multifactor Authentication (MFA). Last, Security Incident & Event Management (SIEM) logs traffic for analyzation, optimization, and evidence of regulatory compliance. Verify first, then trust.