

Teresa Johnson
Using a Zero Trust (ZT) architecture for cybersecurity has become essential throughout the public sector, because it both strengthens cyber defenses and enables continuity of operations in the event of an attack. It further benefits an agency by reducing the time lost and lowering the cost of recovery.
Working in a ZT-based environment makes the addition of innovative technologies such as cloud computing and AI safer; every new technology introduces new risks and attack vectors, but the ZT approach – never trust, always verify – provides robust security and helps prevent lateral movement through networks. As one article observed recently, “Zero trust is not a product or a solution, but a holistic approach that leverages multiple security controls and technologies to verify every request, enforce granular policies, and monitor all activities across the organization.”