[The Readable] – Traditional perimeter-centric network security is based around a well-defined network boundary where all enterprise resources such as devices, file servers, applications, etc. were inside the network and users’ access to the network was strictly controlled. I like to compare traditional perimeter-centric network security to old forts since they have quite a lot in common. Just like traditional perimeter-centric network security, forts had a well defended perimeter wall, and access to the fort was strictly controlled via a draw bridge over a moat.
Read more: https://thereadable.co/opinion-why-should-continuous-authentication-be-at-the-heart-of-your-zero-trust-architecture/