Traditional perimeter security is not good enough to protect organizations from advanced attacks. Organizations should not assume everything behind the firewall is safe, but instead assume breaches will happen. Once an attacker breaks the perimeter, he or she is free to move laterally to access services, applications and data inside the network, which could result in significant damage for the organization.
Such situations become more severe with the proliferation of microservices and cloud-native applications, which require an entirely different mindset from security for legacy applications. With the adoption of containers and Kubernetes, microservices and cloud-native applications become more dynamic and expose many more attack surfaces. They call for new solutions to establish more granular and dynamic protection around and close to each service and application.
Adopting a zero trust model becomes a promising way to address these types of challenges. Zero trust means “never trust, always verify”. In such a model, every request to a service or application should be encrypted, authenticated and authorized, even inside the controlled network.