Home > Storage > PowerScale (Isilon) > Product Documentation > Security and Compliance > Dell PowerScale OneFS: Security Considerations > Overview
In an environment of ever-changing security threats, protecting hardware, software, and firmware is paramount. A zero trust architecture assumes that all hosts are not trusted and must be verified, ensuring that only authorized hosts are granted access. Dell PowerScale OneFS may be configured for a zero trust architecture to secure all access to the cluster.
A zero trust architecture requires all devices to be validated and authenticated. The concept applies to all devices and hosts, ensuring that none is trusted until proven otherwise. Essentially, the model follows a “never trust, always verify” policy for all devices, regardless of location.
Past security models assumed that if a device resides in the same data center or enterprise network, the device is trusted. A perimeter protected the enterprise network, and if a host could penetrate the perimeter, it would have open access to all the devices in the enterprise network. Due to the increasing complexity of today’s enterprise topology, this concept has become obsolete. The typical enterprise network now reaches past the data center and across segments, multiple locations, remote employees, and multiple clouds. The clouds are a combination of public, private, and hosted clouds. In this modern enterprise network, the perimeter is no longer clearly defined, and limiting movement by attackers to other devices is crucial.
Although Forrester Research first defined the zero trust architecture in 2010, the architecture has recently received more attention, with the ever-changing security environment leading to a focus on cybersecurity. The zero trust architecture serves as a general model and must be refined for a specific implementation. For example, in September 2019, the National Institute of Standards and Technology (NIST) introduced a Zero Trust Architecture. As a result, the White House has also published an Executive Order on Improving the Nation’s Cybersecurity, including zero trust initiatives.