Search
UK US
Call us

General Enquiries

0845 838 2050

Enabling Zero Trust

Simplifying Device Health and Identity Management for robust network access control

Zero Trust means different things to different people - from pure hype, to optimal network design. Arguably what's important are the core principles, and where they should apply.

As Zero Trust has gained increased popularity, elements of the approach have been quietly adopted and applied within some sensitive government and critical national infrastructure IT environments. The ever-dissolving corporate perimeter has been a driver for the Zero Trust concept, however for organisations that face elevated threat, it is more a case of not placing complete trust in a perimeter even where it can be identified, but instead building a defence in depth architecture that offers better protection and detection capabilities than many legacy IT architectures.

Zero Trust Architectures

While multiple definitions of Zero Trust exist, a convenient set of principles is outlined by NCSC, consistent with the extensive body of guidance they continue to publish:

  1. know your architecture including users, devices, and services
  2. know your user, service and device identities
  3. know the health of your users, devices and services
  4. use policies to authorise requests
  5. authenticate everywhere
  6. focus your monitoring on devices and services
  7. don’t trust any network, including your own
  8. choose services designed for zero trust

As key building blocks of these Zero Trust principles, device and service heath and identity management standards are less mature than user identity management, yet all ideally inform policies that provide granular control to protected services within a Zero trust model. Becrypt worked with UK Government as part of the CloudClient project, to implement and demonstrate a standards-based Remote Attestation protocol for verifying the health and identity of Secure Thin Client platforms.

Request latest whitepaper


Privileged Access Workstations - A Zero Trust Use Case

PAW Whitepaper

Zero Trust Applications

Drivers for Zero Trust adoption are diverse, from increased use of cloud services, to increased need to protect services from elevated threat and targeted attacks. Becrypt have worked with critical national infrastructure organisations, using Zero Trust principles to protect high-value assetts.

Privileged Access Workstations

Using Zero Trust principles to validate health and identity of PAWs

Protecting Privileged Access

Supply Chain Security

Zero Trust and federated identity for 3rd party access control

Trusting Unmanaged Devices

Get in contact with Becrypt

First name*

Last name*

Email address*

Phone number*

How can we help?*

By submitting your details you are agreeing that we may communicate with you about Becrypt.
I agree to receive marketing updates regarding relevant products and services from Becrypt. Please refer to our Privacy Policy for more information. You can unsubscribe at any time.