Content Assessment: Considering Zero Trust? November 2021 Cyber Events Report from NATO CCDCOE
Information - 90%
Insight - 90%
Relevance - 95%
Objectivity - 90%
Authority - 90%
short percentage-based assessment of the qualitative benefit of the post highlighting the CCDCOE November 2021 Cyber Events Report focused on Zero Trust.
Editor’s Note: From time to time, ComplexDiscovery highlights publicly available or privately purchasable announcements, content updates, and research from cyber, data, and legal discovery providers, research organizations, and ComplexDiscovery community members. While ComplexDiscovery regularly highlights this information, it does not assume any responsibility for content assertions.
To submit recommendations for consideration and inclusion in ComplexDiscovery’s cyber, data, and legal discovery-centric service, product, or research announcements, contact us today.
Cyber Events Report from CCDCOE*
Zero Trust: Considerations for Military and National Security Decision Makers
This recurring report is the collaborative view of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) researchers highlighting the potential effects of current events and developments in cyberspace on armed forces, national security, and critical infrastructure, based on publicly available information. It does not set out to be exhaustive. While the authors have made every effort to describe events from a perspective relevant to NATO and partner nations, there may be national and regional differences which this paper does not address.
The authors of this paper are independent researchers at the NATO CCDCOE; they do not represent NATO, nor does this paper reflect NATO’s position. The aim of the paper is not to replace information about vulnerabilities and incidents provided by CSIRTs and providers of CIS products and services.
The thirteenth installment in this cyber event series focuses on the Zero Trust principle and provides insight into what is, where it originated, what are its best practices, and the principles of its architecture and technology. Additionally, the report considers the legal aspects of Zero Trust.
Today, when companies and organizations set out to modernize and improve their cybersecurity posture, chances are that they will base their approach on the Zero Trust security model — and for good reasons.
Computer security professionals love to say that there is no such thing as 100% security. Despite that, many security strategies seem to be founded on the assumption that setting up border protection and establishing a secure perimeter around the enterprise network can be done well enough. Zero Trust does not make that assumption. Zero Trust is a security model built around the idea that no user or device should be trusted just because it is operating in a ‘private’ network.
CCDCOE Report on Zero Trust
- [Annual Update] International Cyber Law in Practice: Interactive Toolkit
- Defining Cyber Discovery? A Definition and Framework