Complete Your Zero Trust Architecture
Zero Trust is founded on the premise that trust should never be granted implicitly but must be continually evaluated.
A key principle of a Zero Trust Architecture, as defined by NIST, is continuous verification of access requests that accounts for risk from the user and device.
The integrity of an endpoint's operating system is an essential consideration in decisions to allow access requests from it. If an endpoint is compromised, any access request from it may be part of an attacker’s effort to move laterally through the network or to access sensitive data for exfiltration. Any device attributes provided by that endpoint, including operating system details, software inventory, or endpoint protection assessments may be falsified.
In this case, allowing your Zero Trust architecture to understand the runtime integrity of your endpoints is absolutely critical.