Cyber Series 3 Implementing Zero Trust Infrastructure
The OSI model gives us a layered model of how to implement a network. There is a sympathetic security compliance stack that should be fulfilled to ensure our people, processes and data stay safe.
Revolving around the security policy of an organisation our security intent needs to be translated into infrastructure that can actively secure the environment. The key to that policy is that your infrastructure and personnel must almost transparently implement and enforce that policy as part of their day to day operations, for all places in the network. Ideally, through analytics and automation, the network should become adaptive and flexible, acting autonomously to evade intruders and malicious activity before they become an issue.