The traditional perimeter-based security approach is no longer sufficient, and organizations are swiftly embracing zero trust. In the current era where data flows between different clouds and datacenters, it is critical to apply zero trust security at the data layer by using encryption. Encryption makes security an attribute of the data, enabling granular access control regardless of where the data resides.

This white paper shows how to implement the data pillar recommendations of the Zero Trust Maturity Model from the US Cybersecurity and Infrastructure Security Agency (CISA). Although specifically tailored for US federal agencies, any organization would benefit from adopting the approaches outlined in this framework to lower their cybersecurity risk.

Applying Zero Trust Principles to Data Security_cover image