Zero Trust is an architectural decision to stop trusting the network, not just a feature, according to Zscaler CSO Deepen Desai.
Zero Trust is not about branding but architecture, focusing on attack surface reduction at Zscaler.
Zero Trust eliminates network presence, making applications unreachable, and aims to reduce the attack surface.
The core principles of Zero Trust, as defined by NIST and implemented by Zscaler, include never trust, always verify, least-privilege access enforcement, and assuming breach.
Zscaler's Zero Trust architecture enforces principles through ZPA, ensuring applications are not directly reachable, users are off the network, and policies are enforced with every connection.
Zscaler advocates a four-stage adoption path to Zero Trust, starting with securing internet egress, replacing VPNs with ZPA, segmenting user-to-application access, and trapping attackers before damage spreads.
Zero Trust is about containment, not prevention, using measures like deception and isolating breaches to prevent lateral movement.
NAC solutions and cloud VPNs are deemed insufficient for implementing Zero Trust due to their limitations in controlling access and making applications invisible.
Besides security benefits, Zero Trust also brings operational advantages by simplifying infrastructure, reducing complexity, and cutting costs related to VPNs.
The shift towards Zero Trust is already happening, with organizations moving away from VPNs and investing in Zero Trust architecture for improved security and control.