Zero trust is the security principal that nothing within the local area network (LAN) and or trusted network is automatically trusted. Another way to visualize zero trust is to assume that there is currently a threat within the LAN/trusted network. To follow the zero trust principal, implement security controls, such as segmenting the internal network into further microsegments and inspecting traffic between these segments. Other security control examples include using multifactor authentication, leveraging identity and access management solutions, and continuously monitoring and logging network activities.
When implementing and designing for this solution, consider all of the components (robots, servers, and network equipment), how they connect, and how they communicate with each other.
Additional ways to apply this principal include:
- Validate the identity and connectivity from all users and devices.
- Segment internal networks (such as using different VLANs or subnets) between the devices.
- Leverage built-in VMware and Azure security settings for further segmentation and control.