Floating Button
Home Digitaledge In Focus

Five steps to a Zero Trust network infrastructure

Kenny Ng
Kenny Ng • 5 min read
Five steps to a Zero Trust network infrastructure
Here is a five-step how-to for organisations adopting Zero Trust approach to network security.
Font Resizer
Share to Whatsapp
Share to Facebook
Share to LinkedIn
Scroll to top
Follow us on Facebook and join our Telegram channel for the latest updates.

The Zero Trust concept in cybersecurity, where devices are never trusted by default but always verified, is not new.

However, Zero Trust may just be the turning point for organisations in Asia as they strengthen their defences in an increasingly digitalised environment, amidst an intensifying cyber threat landscape.

The Zero Trust approach calls for devices to be verified even if they have previously been permissioned on a network. We now connect more devices via the Internet of Things (IoT) than ever before in both the personal and professional settings. Generally, IoT equipment are designed to provide a single service – which unfortunately means security is not their main priority. This lack of in-built security makes these devices vulnerable to attacks, creating a potential route into the entire organisation’s network for attackers.

×
The Edge Singapore
Download The Edge Singapore App
Google playApple store play
Keep updated
Follow our social media
© 2026 The Edge Publishing Pte Ltd. All rights reserved.