2020, networks and all emerging technology that may be linked will be characterized by three things: security, security and security. We will comment in detail about the Zero Trust model that, beyond being a working model that is gaining more and more followers, is a way of thinking that defines the integrity of the data that is being handled in the network to which we We connect
We have already talked about the Zero Trust VPN and how it focuses on the fact of not trusting anyone, both inside and outside the private network. However, this is not a concept that applies only to this case. Zero Trust is a way of working, thinking and acting. It provides the necessary visibility to people who work in IT about everything they need to know to ensure, manage and monitor both the devices, users and applications on the network. The main goal is to restrict access to sensitive data, applications and devices according to the need of each case.
The strategy of this model is aimed at controlling both the traffic that goes out and the one that enters the network. What distinguishes it from other ways of working is that even the traffic that is generated internally, within the network itself, must be considered as a threat. Some people may consider it as a methodology with an extreme and rough approach, but, nevertheless, the years pass and ZeroTrust is securing its place as a common factor in guaranteeing the security of the networks.
Throughout this time, we have witnessed thousands of data leaks and vulnerabilities that show that certain data can be accessible by anyone. On the other hand, ransomware is responsible for having stopped the operations of several companies and institutions around the world, in addition to putting the economic situation of many people at risk, in exchange for recovering their long-awaited files.

User authentication and access policies
It is based on the correct implementation of multi-factor authentication in conjunction with a structure of security policies that confirm what resources users can access. There are cases of companies that opt for SSO (Single Sign On or Simple Income) that are managed by cloud service providers. The latter is known as IDaaS, that is, Identity-as-a-Service . In the Zero-Trust model, access to resources is protected by the following: the context of the request and the risk it generates in the case of granting permission. The granting of these permissions may mean limited access to the functionalities of the resources we are managing, another layer of authentication is added before granting the permission, or the definition of a specific time when the connection to the network will end automatically .
Segmentation of data and resources
Appropriate segmentation of resources between different users will allow the security policies implemented to be useful. It is no longer reliable to provide unique access and that any user who is within the network can access any resource without any restrictions. This would represent a multitude of risks, especially personal data filtering.
Remember that, within an organization, the employees themselves represent the main risk. Why is it like this? Because anyone who works in a company, regardless of the function it occupies, has under its responsibility one or more company assets. That asset is at constant risk both inside and outside the office.
The same applies to personal data. We ourselves represent the greatest risk for our data. These are exposed at all times, especially when we manipulate them from our mobile. If we do not take the correct security measures, it may be that, in a matter of seconds, our data is compromised or we lose it completely.
Data security
One of the focuses of the Zero Trust model is data security. The application of End-to-End encryption is one of the security measures that are increasingly necessary to apply. It is no longer enough to encrypt the data when sending or receiving it. Also in transit and at the time of being processed, they should not be treated as plain text as this gives a green light to unwanted leaks.
Automated backups guarantee data availability at the time we need them. It is crucial that these copies are generated at least on a weekly basis. If there is any problem with the computer in our workplace and our files are affected, the last backup can save us from more than one problem. Nobody likes having to start any document from scratch.
Cybercriminals generate more and more impact. They do it directly with the action, without warning and only with their attacks. Your data is the most important and valuable asset for them.

The main challenges of the Zero Trust model
Perhaps the most important pair of challenges and the redundancy, challenging, consists of users and data . The types of users are diverse and so are the needs of each one. It is necessary that, as people involved in computer security, we understand the importance of covering as many types of users as possible. Since a permission granted improperly, represents a big problem.
We may not perceive it that way, but if we do work activities or simply, we handle very sensitive personal information while being connected to a public network, we are exposing everything. We can say without fear of error that, if you were not yet a victim of a cyber attack, you are very lucky.
On the other hand, and emphasizing data is not enough that we apply the c onciencia security and other measures of protection. Organizations, especially the IT area, must be updated to plan and implement solutions that guarantee the security of the data stored there. After all, in their servers or in several remote servers is where everyone’s data is.
It is only a matter of a few years for the Zero Trust model to fully consolidate, strengthening its orientation to users and data. It sounds rude, but the motto is: don’t trust anything or anyone. Big cyberattacks are not going to stop and both people and organizations must be prepared.