Summary

Completed 100 XP

In this module, you've learned about Zero Trust concepts that help organizations to manage, monitor, and secure their resources. You should now understand the approach to implementing a Zero Trust strategy and how critical it is for organizations to enforce the Zero Trust principles of verify explicitly, apply least privilege access, and always assume breach. With a Zero Trust strategy in place, every request is verified and authenticated before access to a resource is granted.

The traditional network security approach has become obsolete and isn't strong enough to keep up with today's rapidly evolving digital transformation. A Zero Trust strategy provides end-to-end visibility and control across all domains—identity, endpoints, applications, network, infrastructure, and data. This integrated approach ensures security policies are enforced uniformly across every layer of a digital estate and enables real-time automated threat protection.

Now that you've completed this module, you should be able to:

  • Describe the Zero Trust approach and its principles.
  • Explain Zero Trust as a security strategy.
  • Define Zero Trust components.