If their work provided laptop or personal mobile device is trusted then it isn’t 100% ZERO TRUST. If someone steals the laptop or mobile device and it’s trusted…
With remote organizations you don't have access or control over the networks your users connect from. You also don't have the fear of being seen mitigating some of their actions. In this type of environment Zero Trust is critical.
Content you might like
Accountability - There's no system for accountability - we just rely on people keeping their word33%
Innovation - There's a structured process to contribute an idea and see the eventual outcome and decisions53%
People - Our company finds it difficult to do any of the above33%
People - Laggards hold things back but certain people and teams make it happen31%
General - We find it difficult to do any of the above15%
IT - We are held back from most of the above by legacy systems and a dependence on IT24%
Processes and Workflow - We've reached a point where email, chat and documentation have been replaced with accountable tasking and repeatable processes17%
Processes and Workflow - We publish processes or documentation and try to keep it up-to-date13%
Something else (comments below)1%
Use hypervisor or cloud based network ACL like AWS security groups, use host base firewalls with appropriately restrictive rules, where possible use firewall control planes across environment segments (dev, test, prod, workstations, etc.