Skip to content Skip to main navigation Report an accessibility issue
Information Security

What is Zero Trust?



Zero Trust is a cybersecurity framework that operates on the principle of “never trust, always verify.” Here are the key aspects:

  1. Continuous Verification: Every user and device must be authenticated, authorized, and continuously validated before gaining access to resources, regardless of their location.
  2. Least Privilege Access: Users are granted the minimum level of access necessary to perform their tasks, reducing the risk of unauthorized access.
  3. Micro-Segmentation: The network is divided into smaller segments to limit the spread of potential breaches.
  4. Assume Breach: The framework assumes that threats can come from both inside and outside the network, so it focuses on minimizing the impact of breaches

Zero Trust is a security model that can be beneficial for everyone, not just organizations. Here are some practical ways you can implement Zero Trust principles in your daily digital life:

  • Use Multi-Factor Authentication (MFA): Enable MFA on all your accounts. This adds an extra layer of security by requiring a second form of verification in addition to your password.
  • Limit Access: Only grant access to your devices and accounts to trusted individuals. Be cautious about sharing passwords and use guest accounts when others need to use your devices.
  • Use Strong, Unique Passwords: Create strong passwords for each of your accounts and avoid reusing them. Consider using a password manager to keep track of them.
  • Monitor Account Activity: Regularly check your account activity for any suspicious behavior. Many services offer alerts for unusual login attempts.
  • Secure Your Home Network: Change the default passwords on your router and other connected devices. Use a strong Wi-Fi password and consider setting up a guest network for visitors.
  • Be wary of Phishing: Always verify the source of emails, messages, and links before clicking on them. Phishing attacks are a common way for attackers to access your information.

By adopting these practices, you can significantly enhance your personal security and reduce the risk of unauthorized access to your digital life. Zero Trust is a great model for protecting personal and University systems and equipment!