Zero Trust
TABLE OF CONTENTS
Zero Trust assumes that users shall not be trusted without good reason. This makes the system safer and less vulnerable for hackers.
What is Zero Trust?
Zero Trust is a principle for the safe design and implementation of IT systems. The basic idea behind Zero Trust is that users are never simply trusted and given access. Users must always be verified and are only given access on the basis of verification ("never trust, always verify").
Depending on what user or system needs, specific applications and systems are only made accessible with no more than the necessary rights.
"You won't start to see it until you understand it."
Request a FREE Demo and discover the power of KeyHub.How Zero Trust works
With Zero Trust, users are not trusted without verification. In order to trust a user, you must know who that user is. If the user is authenticated, he/she can be provided access to the systems that the user minimally requires for his/her work. In KeyHub, the user privileges depend on the group to which the user belongs.
Least privileged access
A key hallmark of the Zero Trust model is that users are assigned the least possible access rights. KeyHub works with the Least Privileged principle whereby users are assigned only those access rights that they need to do their work.
Temporary access
Sometimes, users only require temporary access at organisations. When they have finished, revoking this temporary access is often forgotten. This means users continue to have unauthorised access. This is a security risk.
With temporary access, an expiry date of that access is also immediately configured. Once this expiry date of the temporary access has been reached, it is automatically revoked.