From the course: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration

Unlock this course with a free trial

Join today to access over 24,900 courses taught by industry experts.

Comparing legacy security vs. Zero Trust

Comparing legacy security vs. Zero Trust

- [Narrator] Let's go back a decade. Most organizations had a central data center. Company issued laptops and everyone worked inside the office. Security was simple. Build a strong wall around your network and keep the bad guys out. That model worked until it didn't. In this chapter, we'll compare how legacy perimeter-based security stacks up against the zero trust model and why the shift is not just recommended, but necessary. Legacy security focused on one main idea. Keep threats outside. The firewall was the gatekeeper creating a perimeter around your network. Anyone inside the network such as users, devices, or applications, was automatically trusted. This made internal access fast and easy, but it also opened the doors to major risk. The key takeaway here is, legacy models were location based. If you are inside, you are trusted. So, what is the problem with a perimeter? The perimeter edge and the network edge.…

Contents