The user and the device: the two most critical pillars of a Zero Trust Architecture
DISA’s 163-page document on the Zero Trust Reference Architecture presents seven pillars of a zero trust environment. These include the user, device, network, applications, data, visibility, and orchestration. Each of these pillars deserves a deep analysis, but in this short post we argue why the first two — user and device — are most critical.