What is Zero Trust? Zero Trust is a framework and attitude towards IT security that centers on the idea that we in the IT field cannot trust anyone or any device on our network. Many systems administrators are well versed in this model. Every employee is assigned a domain joined laptop that is locked down via Group Policy. Those employees are tracked via a user identity using their AD profile that, through security groups, either allow or restrict access to various IT assets (servers, printers, wireless, and/or client VPN). Accounting is enabled to track what the users are accessing and used in the event of a malicious attack to see where the attack originated and who preformed the attack.
It’s officially spring and for a lot of us that means spring cleaning – the attic, garage, basement, or just all those papers off the desk in the office. While you’re cleaning and reorganizing your personal life it’s also a good idea to take a look at your network and make sure that is cleaned up too. Below is a list of our top 8 best practices for cleaning up your network and devices.
Currently I am working on a project where I am going through and optimizing a large set of Access Control Lists (ACL) on a set of 5585 Firewalls. While going through each ACL I have noticed a few mistakes other engineers have made while configuring these rules. I have compiled a list of these common mistakes. The focus of this blog will be around ACLs on Cisco ASA’s; however these rules still apply to other devices as well.
Subscribe to the informative Newsletter to be Notified Updates in the Technology world.