Guarding beyond the perimeter—Zero Trust security with Oracle Linux

January 23, 2024 | 2 minute read
Gursewak Sokhi
Technical Product Manager - Oracle Linux & Virtualization
Text Size 100%:

Security is at the core of Oracle Linux, irrespective of where you choose to deploy it. Dive into our newly published technical brief, Accelerating Zero Trust adoption with Oracle Linux, and learn how your organization can expedite the adoption of Zero Trust security with the help of the Oracle Linux operating environment.

What is Zero Trust?

Today, continuous innovation is being embraced by both businesses and cybercriminals alike. And cybercriminals are adapting their techniques. For example, firewalls, VPNs, and email gateways are traditional perimeter security measures that cybercriminals are capable of breaching. Zero Trust is an IT security approach focused on preventing threats from both within and outside an organization. This resilient cybersecurity strategy emphasizes that every user, device, or workload connected to an organization’s network should never be trusted, should always be regularly verified, and should be granted least-privilege access to perform its job—nothing more, nothing less.

The time for Zero Trust is now

To help transition to Zero Trust architectures in compliance with the U.S. President's Executive Order 14028 on Improving the Nation’s Cybersecurity, the Cybersecurity and Infrastructure Security Agency (CISA) has established a Zero Trust Maturity Model (ZTMM). Though intended for federal agencies, CISA advises in its ZTMM document that every organization should review and consider the adoption of its outlines. And Zero Trust security has never been more critical—in fact, the memorandum M-22-09 by the U.S. Government "sets forth a Federal zero trust architecture (ZTA) strategy, requiring agencies to meet specific cybersecurity standards and objectives by the end of Fiscal Year (FY) 2024 in order to reinforce the Government’s defenses against increasingly sophisticated and persistent threat campaigns."

Approach Zero Trust security with Oracle Linux

Beyond shipping an operating system with secure defaults, Oracle Linux provides management, automation, virtualization, and cloud native computing tools, all of which have been engineered with a security-first approach. Moreover, foundational components of Zero Trust, including granular separation of duties, least privilege access, and multifactor authentication, are just a few of the many tightly integrated security design principles embedded into Oracle Linux. And to help keep up with the speed at which malicious actors work, Oracle Linux comprises solutions, such as zero-downtime patching for nearly seamless protection with reduced complexity. 

You may be wondering how to put the pieces for Zero Trust together. Here's the deal: Zero Trust security is not a single product or service that can be enabled with a push of a button; it's a complete paradigm shift. To support your Zero Trust journey, the paper illustrates a variety of Oracle Linux solutions that federal agencies and businesses can use to align with the five distinct pillars of CISA's ZTMM: Identity, Devices, Networks, Applications and Workloads, and Data.

Download the paper today to learn more about how Oracle Linux can accelerate your path to an effective Zero Trust security model. 



Gursewak Sokhi

Technical Product Manager - Oracle Linux & Virtualization

Gursewak Sokhi is a Technical Product Manager for Oracle Linux and Virtualization. He holds a Computer Engineering B.S. with a concentration in Systems Programming, and a Mathematics and Economics B.A. from the University of California, Santa Cruz.

Connect with him on LinkedIn:

Previous Post

gprofng: Java Profiling

Elena Zannoni | 14 min read

Next Post

Using systemtap For Tracing libvirt

Shaleen Bathla | 13 min read