{"id":54406,"date":"2024-05-08T12:27:32","date_gmt":"2024-05-08T11:27:32","guid":{"rendered":"https:\/\/www.n-able.com\/?p=54406"},"modified":"2024-05-09T12:54:53","modified_gmt":"2024-05-09T11:54:53","slug":"demystifying-zero-trust-understanding-the-zero-trust-security-model","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model","title":{"rendered":"Demystifying Zero Trust: Understanding the Zero Trust Security Model"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">In the previous blog post we looked at why it\u2019s important for MSPs to get to grips with <a href=\"https:\/\/www.n-able.com\/blog\/demystifying-zero-trust-why-msps-need-to-take-it-seriously\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Zero Trust and Zero Trust Network Access<\/span><\/a>, as well as how to explain the benefits to customers. In this post we\u2019re going to take a deeper dive into some of the philosophy and principles behind Zero Trust.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">The Zero Trust Philosophy<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">You may already be aware of this but it\u2019s important to stress as a starting point that Zero Trust is a mindset and not a product, and centers on the philosophy of: \u201c<b>Never Trust, Always Verify.<\/b>\u201d Having said that, a key impact of this philosophy will be the replacement of some old solutions\u2014particularly solution like VPN\u2014and the integration of new products in order to support the implementation of a Zero Trust strategy across the length and breadth of a company\u2019s IT infrastructure; from users and devices, to networks, applications, and data.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Within Zero Trust, the VPN server comes under strong scrutiny because it embodies the \u201ccastle and moat\u201d security model, in which a protective perimeter is drawn around your network assets, but users are overpermissioned once inside. This means that users, data, and attackers can move freely inside the trusted core.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">In contrast, the \u00adZero Trust Security Model eliminates any implicit trust, adhering to the principle of \u201cnever trust, always verify\u201d. So, for example, an employee accessing a file server could be subject to multi-factor authentication (MFA) control, and have their access continuously re-evaluated so that permissions may adjust dynamically, denying access based on changes in their security posture, such as an attempt to access the fileserver out of hours.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u201cZero Trust may be a relatively new concept in the security market,\u201d says Marc Barry<\/span><span class=\"s3\"><i>, <\/i><\/span><span class=\"s4\">Co-Founder and Chief Product Officer at Enclave<\/span><span class=\"s1\">, \u201cbut there are a growing number of tools and products coming onto the market that are built to support this model. So much so, it can sometime be tricky for MSPs to sift through this expanding toolset to see what\u2019s relevant to them. With this in mind, we created a vendor directory to help them get a bit more perspective on things. This can be accessed at <a href=\"https:\/\/zerotrustnetworkaccess.info\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">https:\/\/zerotrustnetworkaccess.info\/<\/span><\/a>.\u201d<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\">Understanding the principles of Zero Trust<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">\u201cDrilling down past the general philosophy, we can understand Zero Trust as a composition of security principles. Many of which pre-date the popularisation of the Zero Trust principle, but a principle is just that\u00ad\u00ad\u2014a principle,\u201d Marc explains. \u201cIn order to implement principles we need technology, but it can be surprisingly difficult to know which technologies correctly implement which principles, and at this intersection frameworks and marketing terms aim to offer guidance, clarity, and direction.\u201d<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li2\"><b><\/b><span class=\"s1\"><b>Continuous verification:<\/b>\u00a0Device and user security posture is not static, nor is the threat environment that your business operates in, both need to be constantly re-evaluated across all devices and users, and access revoked where necessary, to ensure all resources are trusted, secure, and compliant.<\/span><\/li>\n<li class=\"li2\"><b><\/b><span class=\"s1\"><b>Verify explicitly:<\/b>\u00a0Users should always be authenticated and authorized based on all available data points, such as identity, location, device health, and other contextual factors. The objective here is to remove any implicit trust, even if a user is inside the enterprise network.<\/span><\/li>\n<li class=\"li2\"><b><\/b><span class=\"s1\"><b>Least privilege access:<\/b>\u00a0User access should be restricted to \u201cjust-in-time\u201d and \u201cjust-enough\u201d access, so as to limit users to just what is needed for as long as is necessary. This is to limit potential for unauthorized access or damage if credentials are compromised.<\/span><\/li>\n<li class=\"li2\"><b><\/b><span class=\"s1\"><b>Micro-segmentation:<\/b>\u00a0Here the security perimeter is broken into discrete smaller zones that are isolated from each other. This helps to restrict lateral movement by containing over-permissioned access and reduce the attack surface.<\/span><\/li>\n<li class=\"li2\"><b><\/b><span class=\"s1\"><b>Prevent lateral movement:<\/b>\u00a0Although similar to the above, one feeds the other. This about ensuring strategies and controls are in place to stop attackers from moving around inside the network once they have gained access.<\/span><\/li>\n<li class=\"li2\"><b><\/b><span class=\"s1\"><b>Assume breach:<\/b>\u00a0Similar to the \u201cwhen-not-if\u201d philosophy, you should always assume breaches have occurred, or will occur, and should continually evaluate the systems and processes in place to contain a breach as quickly and effectively as possible.<\/span><\/li>\n<li class=\"li2\"><b><\/b><span class=\"s1\"><b>Automate security actions:<\/b>\u00a0Automated responses are far quicker that manual interventions, so by automating as much as possible you\u2019re improving reaction times and consistency when responding to threats and policy violations.<\/span><\/li>\n<li class=\"li2\"><b><\/b><span class=\"s1\"><b>End-to-end encryption:<\/b>\u00a0To protect data integrity and confidentiality at all stages, it should be encrypted not only in transit, but also at rest.<\/span><\/li>\n<\/ul>\n<h2 class=\"p4\"><span class=\"s1\">Delivering on Zero Trust Principles<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">\u201cThere are a number of different frameworks that can help us understand how to apply technology consistently across a business to deliver and apply the principles of Zero Trust,\u201d adds Marc. \u201cHowever, some of these are either heavily prescriptive and designed to focus on delivering guidance to Federal or Government agencies, or a very theoretical and don\u2019t talk about implementation.\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Some of the most widely recognised frameworks today are:<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li5\"><span class=\"s1\">National Institute of Standards and Technology (NIST) \u2014\u00a0<a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/207\/final\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">SP 800-207, Zero Trust Architecture<\/span><\/a><\/span><\/li>\n<li class=\"li5\"><span class=\"s1\">National Cyber Security Centre (NCSC) \u2014\u00a0<a href=\"https:\/\/www.ncsc.gov.uk\/collection\/zero-trust-architecture\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">Zero Trust Architecture Design Principles<\/span><\/a><\/span><\/li>\n<li class=\"li5\"><span class=\"s1\">Department of Defense (DoD) \u2014\u00a0<a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/(U)ZT_RA_v2.0(U)_Sep22.pdf\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">Zero Trust Reference Architecture<\/span><\/a><\/span><\/li>\n<li class=\"li5\"><span class=\"s1\">Cybersecurity and Infrastructure Security Agency (CISA) \u2014\u00a0<a href=\"https:\/\/www.cisa.gov\/zero-trust-maturity-model\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\">Zero Trust Maturity Model<\/span><\/a><\/span><\/li>\n<\/ul>\n<p class=\"p6\"><span class=\"s6\">When it comes to applying Zero Trust, one of the key hurdles MSPs need to overcome is that they must \u2018right-size\u2019 their provision\u2014if they don\u2019t do this they run the risk of <\/span><span class=\"s3\"><i>diminishing returns and excessive overspend on security products that don&#8217;t add value<\/i><\/span><span class=\"s6\">. \u201cWe\u2019ve found t<\/span><span class=\"s1\">hat our partners and customers often find the CISA model strikes the right balance here because it <\/span><span class=\"s6\">recognises the need to approach Zero Trust as a journey,\u201d says Marc. \u201c<\/span><span class=\"s1\">This matters to MSPs because they can use it as a yard-stick to right-size and tailor each Zero Trust solution they deliver to each customer against recognised, US government sponsored guidance. This guidance lets them measure their customers\u2019 existing level of maturity and plot a sensible path forwards, which doesn\u2019t put them at risk of over-cooking the implementation for the customer. Essentially it gives them a yellow brick road to follow.\u201d<\/span><\/p>\n<p class=\"p7\"><span class=\"s1\"><i>Image Source: &#8222;Zero Trust Maturity Model V2&#8220;<br \/>\nCybersecurity &amp; Infrastructure Security Agency (CISA), April 2023, Page 8,\u00a0<\/i><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/2023-04\/zero_trust_maturity_model_v2_508.pdf\" target=\"_blank\" rel=\"noopener\"><span class=\"s7\"><i>Source<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">\u00a0<\/span><span class=\"s8\">The real value of the CISA model is the emphasis its authors place on the strategic approach of making incremental, but tangible advancements mapped out and aligned to recognised, industry-wide security best practices.<\/span><\/p>\n<p class=\"p8\"><span class=\"s8\">CISA\u2019s model maps out the maturity journey across five key pillars: identity, devices, networks, applications, and data.<\/span><\/p>\n<p class=\"p8\"><span class=\"s8\">Each pillar can advance independently at its own pace, allowing for ongoing optimization. For instance, you might begin by ensuring all user identities are verified against strong authentication standards, then move to secure devices with up-to-date defences.<\/span><\/p>\n<p class=\"p8\"><span class=\"s8\">This approach ensures that improvements in security are both manageable for the customer and impactful to the business, giving you an evidence-based maturity roadmap to use to build a healthy and collaborative partner-customer relationship.<\/span><\/p>\n<p class=\"p9\"><span class=\"s6\">\u201cAs an MSP, one of the first things to grasp is that every journey to Zero Trust maturity will be different, and not all customers and businesses will be able to move at the same speed, says <\/span><span class=\"s1\">Marc<\/span><span class=\"s9\">.<\/span><span class=\"s1\"> \u201cWhile the CISA model defines a maturity journey, and\u00a0the pillars help an organization think about where they should be looking, it\u2019s really hard to say \u2018this is the way forward for everyone\u2019. It&#8217;s a sliding scale. I think one of the biggest challenges that we&#8217;ve seen with the emergence and adoption of Zero Trust, is that there isn&#8217;t really a \u2018one size fits all\u2019 formula.\u201d<\/span><\/p>\n<p class=\"p9\"><span class=\"s1\">Zero Trust is a composition of lots of different security ideas. Some of which have been with us for a long time, but are now all stitched together under the umbrella philosophy of \u201cnever trust, always verify\u201d.<\/span><\/p>\n<p class=\"p9\"><span class=\"s1\">Marc believes this makes setting out a definitive recipe for Zero Trust extremely difficult. \u201cShould it include endpoint detection and response?\u00a0Absolutely.\u00a0Should it include <a href=\"https:\/\/www.n-able.com\/products\/managed-detection-and-response\" target=\"_blank\" rel=\"noopener\"><span class=\"s10\">managed detection and response<\/span><\/a>? Well, potentially, but whether it should do for you and your customer is not cut and dried,\u201d he explains. \u201cOf course principles like least privilege and micro segmentation are essential components of the Zero Trust philosophy, but I don\u2019t think it\u2019s fair to say you\u2019re not doing an effective job if you haven&#8217;t automated all security actions, got risk analytics or visibility of behaviour and usage patterns for anomaly detection. It\u2019s got to be a sliding scale.\u201d<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">For your customer, Zero Trust is an opportunity to build cyber-resilience into their businesses, but for you, it&#8217;s opportunity. An opportunity to deepen existing customer relationships and make new ones, to build trust and credibility, and to expand revenue streams by delivering real security value.<\/span><span class=\"s1\">\u00a0<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u201cThe days of enabling the built-in VPN server on the firewall and leaving it to languish are over, but at the same time it\u2019s very hard to draw up a Zero Trust strategy that fits all of an MSPs customers without some tailoring.\u201d<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">\u201cMSPs need to be taking into account customer context, existing technologies, current working practices, threat models, budgets, board-level risk-awareness etc; but that\u2019s also the opportunity for a Zero Trust service offering.,\u201d Marc concludes. \u201cForward-thinking MSPs are already looking at the CISA model and realising everything they need to get started is in there. They\u2019re inviting customers to measure their capabilities and using the CISA guidance show them why, when and how they\u2019re going to mature.\u201d<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\"><i>In the next blog we\u2019ll take the Zero Trust conversation a step further by focusing on the concept Zero Trust Network Access (ZTNA), what it actually means, and how it replaces VPN.<\/i><\/span><span class=\"s1\"><\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"15%\" valign=\"top\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\" alt=\"\" width=\"252\" height=\"259\" class=\"alignnone size-full wp-image-52798\" \/><\/td>\n<td width=\"2%&quot;\"><\/td>\n<td><strong><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\"><a href=\"https:\/\/www.n-able.com\/integrations\/enclave\" target=\"_blank\" rel=\"noopener\">Enclave<\/a> has developed and maintains integrations with N&#8209;sight and N&#8209;central, via close collaboration with N&#8209;able&#8217;s Technology Alliance Program. You can find out more about TAP by visting <a href=\"https:\/\/www.n-able.com\/partnerships\/technology-alliance-program\" target=\"_blank\" rel=\"noopener\">www.n-able.com\/partnerships\/technology-alliance-program<\/a>.\u00a0<\/span><\/strong><\/p>\n<p><strong>To see all the industry-leading integrations provided by our TAP Partners visit <a href=\"https:\/\/www.n-able.com\/integrations\" target=\"_blank\" rel=\"noopener\">www.n-able.com\/integrations<\/a><\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>In the second part of our blog trilogy on Zero Trust and ZTNA, Enclave\u2019s Marc Barry takes Pete Roythorne on a deep dive into the philosophy and models behind the&#8230;<\/p>\n","protected":false},"author":63,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-54406","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Demystifying Zero Trust: Understanding the Zero Trust Security Model - N-able<\/title>\n<meta name=\"description\" content=\"Enclave\u2019s Marc Barry takes Pete Roythorne on a deep dive into the philosophy and models behind the zero trust architecture.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Demystifying Zero Trust: Understanding the Zero Trust Security Model - N-able\" \/>\n<meta property=\"og:description\" content=\"Enclave\u2019s Marc Barry takes Pete Roythorne on a deep dive into the philosophy and models behind the zero trust architecture.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-08T11:27:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-09T11:54:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/05\/041924_BlogBanner_EnclaveZeroTrustPt2_PD_Final-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1340\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pete Roythorne\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pete Roythorne\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"8\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model\"},\"author\":{\"name\":\"Pete Roythorne\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\"},\"headline\":\"Demystifying Zero Trust: Understanding the Zero Trust Security Model\",\"datePublished\":\"2024-05-08T12:27:32+01:00\",\"dateModified\":\"2024-05-09T11:54:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model\"},\"wordCount\":1659,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model\",\"name\":\"Demystifying Zero Trust: Understanding the Zero Trust Security Model - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\",\"datePublished\":\"2024-05-08T12:27:32+01:00\",\"dateModified\":\"2024-05-09T11:54:53+00:00\",\"description\":\"Enclave\u2019s Marc Barry takes Pete Roythorne on a deep dive into the philosophy and models behind the zero trust architecture.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#primaryimage\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Demystifying Zero Trust: Understanding the Zero Trust Security Model\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837\",\"name\":\"Pete Roythorne\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g\",\"caption\":\"Pete Roythorne\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Demystifying Zero Trust: Understanding the Zero Trust Security Model - N-able","description":"Enclave\u2019s Marc Barry takes Pete Roythorne on a deep dive into the philosophy and models behind the zero trust architecture.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model","og_locale":"de_DE","og_type":"article","og_title":"Demystifying Zero Trust: Understanding the Zero Trust Security Model - N-able","og_description":"Enclave\u2019s Marc Barry takes Pete Roythorne on a deep dive into the philosophy and models behind the zero trust architecture.","og_url":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-05-08T11:27:32+00:00","article_modified_time":"2024-05-09T11:54:53+00:00","og_image":[{"width":2560,"height":1340,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/05\/041924_BlogBanner_EnclaveZeroTrustPt2_PD_Final-scaled.jpg","type":"image\/jpeg"}],"author":"Pete Roythorne","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Pete Roythorne","Gesch\u00e4tzte Lesezeit":"8\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model"},"author":{"name":"Pete Roythorne","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837"},"headline":"Demystifying Zero Trust: Understanding the Zero Trust Security Model","datePublished":"2024-05-08T12:27:32+01:00","dateModified":"2024-05-09T11:54:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model"},"wordCount":1659,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png","articleSection":["Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model","url":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model","name":"Demystifying Zero Trust: Understanding the Zero Trust Security Model - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#primaryimage"},"thumbnailUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png","datePublished":"2024-05-08T12:27:32+01:00","dateModified":"2024-05-09T11:54:53+00:00","description":"Enclave\u2019s Marc Barry takes Pete Roythorne on a deep dive into the philosophy and models behind the zero trust architecture.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#primaryimage","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2024\/03\/TAP.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/demystifying-zero-trust-understanding-the-zero-trust-security-model#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/de\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Demystifying Zero Trust: Understanding the Zero Trust Security Model"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/d6ca231a620b3d6123d2775901a88837","name":"Pete Roythorne","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/53f934b9b6340a099ceaada1343f5ed04118208c6e9362be4651f1278c6819fd?s=96&d=mm&r=g","caption":"Pete Roythorne"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/54406","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/63"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=54406"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/54406\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=54406"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}