{"id":52276,"date":"2023-06-09T14:12:20","date_gmt":"2023-06-09T14:12:20","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/"},"modified":"2023-06-09T14:12:20","modified_gmt":"2023-06-09T14:12:20","slug":"seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/","title":{"rendered":"Seven steps for using zero trust to protect your multicloud estate"},"content":{"rendered":"<p><span class=\"label\">Commissioned<\/span> Commissioned: If you&#8217;re like most IT leaders, you are facing two uncomfortable realities. The first is that external and internal cybersecurity threats are proliferating from individuals, independent collectives and nation-state attackers. The second is that your computing operating models are becoming more complex, as their tentacles spread across multicloud environments.<\/p>\n<p>Which makes protecting against the former reality infinitely more difficult. Because with so many distributed device, software and network access points, <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/Why-relying-on-network-perimeter-security-alone-is-a-failure\" rel=\"nofollow\">perimeter defense is no longer a viable option<\/a>.<\/p>\n<p>Rather, a complex multicloud landscape requires a zero trust approach to protecting data. Zero trust&#8217;s central tenet is that there is perimeter and that the increasing sophistication of attacks and the growing distribution of digital assets requires a <a href=\"https:\/\/www.nist.gov\/blogs\/taking-measure\/zero-trust-cybersecurity-never-trust-always-verify\" rel=\"nofollow\">&#8220;never trust, always verify&#8221; stance<\/a> to cybersecurity.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"condor\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>Best practices for crafting a zero trust strategy are well understood and rigorously documented. To better understand how to execute this sweeping defense, it&#8217;s important to consider the scope of modern computing environments.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xmd=\",fluid,mpu,leaderboard,\" data-lg=\",fluid,mpu,leaderboard,\" data-xlg=\",fluid,billboard,superleaderboard,mpu,leaderboard,\" data-xxlg=\",fluid,billboard,superleaderboard,brandwidth,brandimpact,leaderboard,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<div class=\"adun_eagle_desktop_story_wrapper\">\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"mid\" data-raptor=\"eagle\" data-xxlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<\/p><\/div>\n<p> <strong>Multicloud sprawl<\/strong>\n<\/p>\n<p>If your enterprise IT profile is like that of your peers, your software workloads are running in on-premises gear as well as a mix of public and private clouds. Maybe you also run assets in a colocation facility or at the edge.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" data-pos=\"top\" data-raptor=\"falcon\" data-xsm=\",fluid,mpu,\" data-sm=\",fluid,mpu,\" data-md=\",fluid,mpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=4&amp;c=44ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D426raptor%3Dfalcon%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>If you preside over such a hodge podge you likely also manage a cybersecurity profile that is nightmarish in its complexity, littered with disparate protocols and security keys. As a result, most organizations struggle with data protection.<\/p>\n<p>Seventy-two percent of 1,000 IT decision makers cited the inability to locate and protect dynamic and distributed data generated by DevOps and cloud development processes, according to the <a href=\"https:\/\/www.dell.com\/en-us\/dt\/data-protection\/gdpi\/index.htm?dgc=Af&amp;cid=apexcontentmkting&amp;lid=register\" rel=\"nofollow\">Dell Technologies Data Protection Index<\/a>. Overall, 67 percent of those surveyed said they are not confident that they can sufficiently cope with ransomware and malware attacks.<\/p>\n<p>Functionally, zero trust in a multicloud environment is like the security protocols people encounter as they navigate airports en route to their destinations.<\/p>\n<div aria-hidden=\"true\" class=\"adun\" id=\"story_eagle_xsm_sm_md_xmd_lg_xlg\" data-pos=\"mid\" data-raptor=\"eagle\" data-xsm=\",mpu,dmpu,\" data-sm=\",mpu,dmpu,\" data-md=\",mpu,dmpu,\" data-xmd=\",mpu,dmpu,\" data-lg=\",mpu,dmpu,\" data-xlg=\",mpu,dmpu,\"> <noscript> <a href=\"https:\/\/pubads.g.doubleclick.net\/gampad\/jump?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" target=\"_blank\" rel=\"noopener\"> <img decoding=\"async\" src=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=3&amp;c=33ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0\" alt> <\/a> <\/noscript> <\/div>\n<p>People provide identification and pay for baggage check with a credit or debit card. Then they are scanned several different ways\u2014some obvious and some discreet\u2014as they wind their way through the screening process. Airport employees and federal security officials collaborate to authenticate passengers with considerable rigor.<\/p>\n<p>Zero trust operates a bit like the airport security process, albeit across an exponentially larger and digital footprint. Sprawling hybrid and multicloud environments store data in a variety of locations, with each system leveraging its own security protocols.<\/p>\n<p>Reconciling these challenges in diverse environments is hard. Extending the airport analogy, you might even say it&#8217;s akin to changing the engine on a flying jetliner.<\/p>\n<p>Fortunately, the <a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/DoD-ZTStrategy.pdf\" rel=\"nofollow\">U.S. Department of Defense offers 7 pillars<\/a>, or a blueprint for a robust zero trust strategy defense. Those tenets include:<\/p>\n<p> <strong>Defense is multilayered &#8211; and persistent<\/strong>\n<\/p>\n<p><strong>User.<\/strong> You&#8217;ll continually authenticate, access and verify user activity patterns to govern users&#8217; access and privileges. This will help you protect and secure all interactions.<\/p>\n<p><strong>Devices.<\/strong> You&#8217;ll institute real-time inspection, assessment and patching of corporate-issued laptops, PCs and other work devices informs every access request.<\/p>\n<p><strong>Applications and Workloads.<\/strong> You&#8217;ll monitor and protect every software asset, including applications, hypervisors, virtual machines and containers.<\/p>\n<p><strong>Data.<\/strong> Central to the DoD&#8217;s pillars, data is the great glue for all of your enterprise assets. If key data is comprised, you risk losing the corporate kingdom. You need total transparency and visibility across all of your data, which you&#8217;ll secure with your infrastructure, apps, standards, encryption and data tagging.<\/p>\n<p><strong>Network and Environment.<\/strong> You&#8217;ll segment, isolate and control the network with granular policy and access controls.<\/p>\n<p><strong>Automation and Orchestration.<\/strong> You&#8217;ll define processes and policies for automating security responses, enabled by artificial intelligence (AI) and machine learning (ML), that helps ensure remediation based on intelligent decisions.<\/p>\n<p><strong>Visibility and Analytics.<\/strong> Your sprawling multicloud estate needs software sentinels watching for anomalous behavior. You&#8217;ll implement tools that analyze all events, activities and behaviors to generate context. And you&#8217;ll use AI and ML to improve detection and reaction time in making access decisions.<\/p>\n<p> <strong>How zero trust safeguards multicloud environments<\/strong>\n<\/p>\n<p>Applying these zero trust pillars is critical as you cultivate a <a href=\"https:\/\/www.dell.com\/en-us\/blog\/whats-multicloud-by-design-and-why-does-it-matter\/?dgc=Af&amp;cid=apexcontentmkting&amp;lid=Register\" rel=\"nofollow\">multicloud-by-design strategy<\/a>, in which application workloads are deliberately allocated across on-premises, public and private clouds, colos and edge devices, based on factors such as performance, security and cost.<\/p>\n<p>You&#8217;ll classify applications and data; segment networks to break up assets into smaller parts to limit the spread of malware; incorporate strong encryption and continuous monitoring; and institute access controls based on the principle of &#8220;least privilege,&#8221; or granting users access to assets they need to do their jobs.<\/p>\n<p>Your model will include <a href=\"https:\/\/www.dell.com\/en-us\/dt\/corporate\/newsroom\/announcements\/detailpage.press-releases~usa~2023~05~dell-technologies-project-fort-zero-to-transform-security.htm#\/filter-on\/Country:en-us?dgc=Af&amp;cid=apexcontentmkting&amp;lid=Register\" rel=\"nofollow\">backup and recovery services<\/a> to help you geo-locate lost or stolen devices, remotely wipe them if necessary and recover devices from a snapshot. And in the event of a breach, the <a href=\"https:\/\/www.forbes.com\/sites\/delltechnologies\/2022\/10\/19\/4-cybersecurity-tips-for-protecting-your-companys-prized-assets\/?sh=7f4b8f1217ed?dgc=Af&amp;cid=apexcontentmkting&amp;lid=Register\" rel=\"nofollow\">right cyber recovery systems help you remediate compromised data<\/a> in a digital vault that is isolated, immutable and intelligent and features critical access management constraints.<\/p>\n<p>By applying the multiple security measures incorporated in a zero trust model to an intentional multicloud strategy you&#8217;ll ensure that your organization&#8217;s data and applications are protected across a complex, distributed environment.<\/p>\n<p>Above all, remember this key maxim as you bake zero trust into your multicloud strategy: &#8220;Never trust, always verify.&#8221;<\/p>\n<p> <i>Learn more about our portfolio of cloud experiences delivering simplicity, agility and control as-a-service:&nbsp;<\/i> <a href=\"https:\/\/www.dell.com\/en-us\/dt\/apex\/index.htm?dgc=Af&amp;cid=apexcontentmkting&amp;lid=Register\" rel=\"nofollow\"> <b> <i>Dell Technologies APEX<\/i> <\/b> <\/a> <i>.<\/i>\n<\/p>\n<p> <i>Commissioned by Dell Technologies.<\/i>\n<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2023\/06\/09\/seven_steps_for_using_zero\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your multicloud environment is complex. You need an uncompromising zero trust approach to manage and secure it. Commissioned\u00a0 Commissioned: If you&#8217;re like most IT leaders, you are facing two uncomfortable realities. The first is that external and internal cybersecurity threats are proliferating from individuals, independent collectives and nation-state attackers. The second is that your computing operating models are becoming more complex, as their tentacles spread across multicloud environments.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-52276","post","type-post","status-publish","format-standard","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Seven steps for using zero trust to protect your multicloud estate 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seven steps for using zero trust to protect your multicloud estate 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-09T14:12:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Seven steps for using zero trust to protect your multicloud estate\",\"datePublished\":\"2023-06-09T14:12:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/\"},\"wordCount\":912,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/\",\"name\":\"Seven steps for using zero trust to protect your multicloud estate 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"datePublished\":\"2023-06-09T14:12:20+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/#primaryimage\",\"url\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\",\"contentUrl\":\"https:\\\/\\\/pubads.g.doubleclick.net\\\/gampad\\\/ad?co=1&amp;iu=\\\/6978\\\/reg_security\\\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seven steps for using zero trust to protect your multicloud estate\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seven steps for using zero trust to protect your multicloud estate 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/","og_locale":"en_US","og_type":"article","og_title":"Seven steps for using zero trust to protect your multicloud estate 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2023-06-09T14:12:20+00:00","og_image":[{"url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Seven steps for using zero trust to protect your multicloud estate","datePublished":"2023-06-09T14:12:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/"},"wordCount":912,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/","url":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/","name":"Seven steps for using zero trust to protect your multicloud estate 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/#primaryimage"},"thumbnailUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","datePublished":"2023-06-09T14:12:20+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/#primaryimage","url":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0","contentUrl":"https:\/\/pubads.g.doubleclick.net\/gampad\/ad?co=1&amp;iu=\/6978\/reg_security\/front&amp;sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&amp;tile=2&amp;c=2ZINKy03O2LEIxZRJDu8SnAAAARA&amp;t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/seven-steps-for-using-zero-trust-to-protect-your-multicloud-estate\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Seven steps for using zero trust to protect your multicloud estate"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52276","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=52276"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/52276\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=52276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=52276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=52276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}