Content Icon

Zero Trust Architecture for the Workforce: A Checklist

May 13, 2020 | Tools & Templates | Architecture, Configuration and Segmentation | By Wolfgang Goerlich, IANS Faculty

The principles of a zero trust architecture (ZTA) can apply to people, devices and equipment, or application services. This checklist is intended to help security teams implement ZTA for the organization’s workforce.


Already a client?

Log In to Continue

Not a client?

Request More Information

Related Research

Orlando Virtual Symposium – Zero Trust: Architecture, Policies, and Technology

The Zero Trust vendor bandwagon is spilling over and organizations can’t keep up. They need help understanding which technologies fit into the concept and how best to configure them.

Executive Communications Q1 2020 Recap: A COVID-19 Business Continuity Scorecard

IANS Faculty Wolfgang Goerlich and Founder/CEO Phil Gardner explain how the most impactful crises are the ones we least expect, provide a business continuity scorecard detailing how organizations have fared thus far amid the COVID-19 pandemic, and offer guidance for planning for a post-lockdown environment.

Zero Trust: Making It Work for You

Security teams need to understand what zero-trust principals are and how to properly implement them across the organization. In this webinar, IANS Faculty Wolfgang Goerlich starts with the nuts and bolts, then delves into how zero trust architecture lowers the risk of common attacks, real-world examples of successful zero trust in action and legacy tech that doesn’t play well.