Zero Trust Compliance ZTF
Never trust, always verify. All network devices are untrusted until they have been authenticated
The CSAP Zero-Trust Foundation (ZTF) is a zero-trust implementation as might be used in any enterprise adopting zero-trust but with certain functionality that should be included. Examples of Zero Trust include:
• Authenticate each user before they are allowed to join or access a workflow/system
• Authenticate all systems and services before being used in any workflow
• Ensure all service communication is directed through a policy enforcement point
• Validate certificates used for authentication against a trusted certificate authority before being accepted
• Mutually authenticate connections between two systems or services
• Establish an encrypted connection via Mutual Authentication before communication between proxies/endpoints can take place
Zero Trust Compliance
Our experienced assessors within the ConvergentDS team, will assess your environment for Zero Trust compliance providing advice, guidance and priorities for any remediation.