Gaurav Gupta

Nice article Safeer. As boundaries of organizations are no longer limited to physical offices and applications too are now based on hybrid infrastructure. The zero trust model of trust but verify on each request becomes more important than ever.

Being part of security team that too blue team, I can totally relate to this. Collection of proper logs from all these proxies, access policy engines, IAM machines becomes very important along with real time intelligence based on activity, device health and OSINT. The continuous evaluation of device trust is great concept to deal with threats in real time and adjust permissions based inputs from diferent trusted sources.

--

--

Gaurav Gupta

Gaurav Gupta

Techie, Curious photographer, Friend and rebellious soul