From the course: CompTIA SecurityX (CAS-005) Cert Prep

Unlock this course with a free trial

Join today to access over 24,300 courses taught by industry experts.

Security boundaries and deperimeterization

Security boundaries and deperimeterization

From the course: CompTIA SecurityX (CAS-005) Cert Prep

Security boundaries and deperimeterization

- A zero trust data perimeter is a created security boundary around sensitive data to ensure it's only accessible to authorized users and systems. Let's use XYZ Limited as an example. This company, with over 100 remote employees across 14 countries, implemented Zero Trust architecture to secure its IT infrastructure. They used Pomerium for context-aware authentication. They used Google Workspace for multi-factor authentication, and they used VMware NSX for their network segmentation. Additionally, they integrated FleetDM for device compliance and then Forcepoint DLP to prevent data exfiltration. Zero Trust secure zones are a fundamental aspect of the ZT architecture. It's designed to enhance security by segmenting the network into smaller, isolated areas. This approach helps limit the movement of potential threats and it reduces the attack surface. Here are the key components of Zero Trust secure zones. First, we have network segmentation. Dividing the network into smaller segments or…

Contents