{"id":1988,"date":"2021-02-20T15:14:21","date_gmt":"2021-02-20T20:14:21","guid":{"rendered":"https:\/\/truxgoservers.com\/blog\/?p=1988"},"modified":"2021-02-20T15:14:22","modified_gmt":"2021-02-20T20:14:22","slug":"zero-trust-policies-what-is-their-function","status":"publish","type":"post","link":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/","title":{"rendered":"Zero Trust policies &#8211; What is their function"},"content":{"rendered":"\n<p>Zero Trust presents us with a new paradigm in the way we protect our organizations, our data and our employees, being a security model based on the premise of not trusting anyone blindly within the network, as well as denying access until have been validated and legitimized as authorized. It supports the implementation of least privileged access, which is designed to selectively grant access only and exclusively to those resources that users or groups of users need.<\/p>\n\n\n\n<p>While it is difficult to pinpoint the tipping point, one thing is certain: what was once extraordinarily difficult has become everyday today. Data breaches are no longer extraordinary. In recent years, major companies such as HBO, Uber, Deloitte, HP, Oracle, video game companies and many others have received a large number of targeted attacks and this has shown us that any organization, whether public or private, is susceptible to attacks.<\/p>\n\n\n\n<p>Traditional perimeter security relied on firewalls, VPNs, and gateways to separate trusted zones from untrusted users. But as mobile employees began to access the network through their own account, with their own devices, blurred perimeters began to be created. And like inri, these perimeters practically disappeared with the rise of cloud computing and IoT devices. We could say that we are in that moment, where the benefits of these technologies outweigh the perceived risks.<\/p>\n\n\n\n<p>Implementing a Zero Trust model protects private applications and network assets, while dramatically reducing risks such as malicious internal users and compromised accounts.   When designing a Zero Trust strategy for remote access to an environment, this strategy is called Zero Trust Network Access or ZTNA. This offers the following functions:<\/p>\n\n\n\n<p><strong><em>\u25b8Strong authentication<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Efficient protection of remote user access<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Reduction of possible infractions and damages<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Protection of sensitive data and intellectual property<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Accelerating a transition to the cloud<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>\u25b8Security transformation: initiating the replacement of VPNs and adopting software solutions<\/em><\/strong><\/p>\n\n\n\n<p>See also:<br><a href=\"https:\/\/truxgoservers.com\/blog\/administer-and-manage-security-risks\/\">Administer and Manage security risks<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust presents us with a new paradigm in the way we protect our organizations, our data and our employees, being a security model based on the premise of not trusting anyone blindly within the network, as well as denying access until have been validated and legitimized as authorized. It supports the implementation of least [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1989,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[36],"class_list":["post-1988","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust policies - What is their function - Truxgo Server Blog<\/title>\n<meta name=\"description\" content=\"Zero Trust is a strategic initiative that helps prevent successful data breaches which can be critical for any business company....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust policies - What is their function - Truxgo Server Blog\" \/>\n<meta property=\"og:description\" content=\"Zero Trust is a strategic initiative that helps prevent successful data breaches which can be critical for any business company....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/\" \/>\n<meta property=\"og:site_name\" content=\"Truxgo Server Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-20T20:14:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-20T20:14:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Trust.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Truxgo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Truxgo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/\"},\"author\":{\"name\":\"Truxgo\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\"},\"headline\":\"Zero Trust policies &#8211; What is their function\",\"datePublished\":\"2021-02-20T20:14:21+00:00\",\"dateModified\":\"2021-02-20T20:14:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/\"},\"wordCount\":324,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Trust.png\",\"keywords\":[\"Cybersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/\",\"name\":\"Zero Trust policies - What is their function - Truxgo Server Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Trust.png\",\"datePublished\":\"2021-02-20T20:14:21+00:00\",\"dateModified\":\"2021-02-20T20:14:22+00:00\",\"description\":\"Zero Trust is a strategic initiative that helps prevent successful data breaches which can be critical for any business company....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/#primaryimage\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Trust.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Trust.png\",\"width\":900,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/zero-trust-policies-what-is-their-function\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust policies &#8211; What is their function\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"name\":\"Truxgo Server Blog\",\"description\":\"Cloud Server and Hosting Tutorials.\",\"publisher\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#organization\",\"name\":\"Truxgo Server Blog\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"contentUrl\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/cropped-truxgo-logo-blanco.png\",\"width\":1250,\"height\":278,\"caption\":\"Truxgo Server Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/#\\\/schema\\\/person\\\/8b409c26449db6aa09724b45331e333e\",\"name\":\"Truxgo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g\",\"caption\":\"Truxgo\"},\"sameAs\":[\"https:\\\/\\\/truxgoservers.com\\\/blog\"],\"url\":\"https:\\\/\\\/truxgoservers.com\\\/blog\\\/author\\\/truxgo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust policies - What is their function - Truxgo Server Blog","description":"Zero Trust is a strategic initiative that helps prevent successful data breaches which can be critical for any business company....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/","og_locale":"es_MX","og_type":"article","og_title":"Zero Trust policies - What is their function - Truxgo Server Blog","og_description":"Zero Trust is a strategic initiative that helps prevent successful data breaches which can be critical for any business company....","og_url":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/","og_site_name":"Truxgo Server Blog","article_published_time":"2021-02-20T20:14:21+00:00","article_modified_time":"2021-02-20T20:14:22+00:00","og_image":[{"width":900,"height":400,"url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Trust.png","type":"image\/png"}],"author":"Truxgo","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Truxgo","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/#article","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/"},"author":{"name":"Truxgo","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e"},"headline":"Zero Trust policies &#8211; What is their function","datePublished":"2021-02-20T20:14:21+00:00","dateModified":"2021-02-20T20:14:22+00:00","mainEntityOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/"},"wordCount":324,"commentCount":1,"publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Trust.png","keywords":["Cybersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/","url":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/","name":"Zero Trust policies - What is their function - Truxgo Server Blog","isPartOf":{"@id":"https:\/\/truxgoservers.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/#primaryimage"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/#primaryimage"},"thumbnailUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Trust.png","datePublished":"2021-02-20T20:14:21+00:00","dateModified":"2021-02-20T20:14:22+00:00","description":"Zero Trust is a strategic initiative that helps prevent successful data breaches which can be critical for any business company....","breadcrumb":{"@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/#primaryimage","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Trust.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2021\/02\/Trust.png","width":900,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/truxgoservers.com\/blog\/zero-trust-policies-what-is-their-function\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/truxgoservers.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Zero Trust policies &#8211; What is their function"}]},{"@type":"WebSite","@id":"https:\/\/truxgoservers.com\/blog\/#website","url":"https:\/\/truxgoservers.com\/blog\/","name":"Truxgo Server Blog","description":"Cloud Server and Hosting Tutorials.","publisher":{"@id":"https:\/\/truxgoservers.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/truxgoservers.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/truxgoservers.com\/blog\/#organization","name":"Truxgo Server Blog","url":"https:\/\/truxgoservers.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","contentUrl":"https:\/\/truxgoservers.com\/blog\/wp-content\/uploads\/2020\/08\/cropped-truxgo-logo-blanco.png","width":1250,"height":278,"caption":"Truxgo Server Blog"},"image":{"@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/truxgoservers.com\/blog\/#\/schema\/person\/8b409c26449db6aa09724b45331e333e","name":"Truxgo","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/52691a61c58e68677ed4860007c1bb03b14eabe7350747ab3fad3e17825b4b96?s=96&d=mm&r=g","caption":"Truxgo"},"sameAs":["https:\/\/truxgoservers.com\/blog"],"url":"https:\/\/truxgoservers.com\/blog\/author\/truxgo\/"}]}},"_links":{"self":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/comments?post=1988"}],"version-history":[{"count":2,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1988\/revisions"}],"predecessor-version":[{"id":2004,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/posts\/1988\/revisions\/2004"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media\/1989"}],"wp:attachment":[{"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/media?parent=1988"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/categories?post=1988"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/truxgoservers.com\/blog\/wp-json\/wp\/v2\/tags?post=1988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}