LogoLogo
GoodAccess WebsiteRequest Free TrialDownload App
  • Getting Started
    • 1. What is GoodAccess?
    • 2. Architecture Overview
    • 3. Sign up for Free Trial
    • 4. Download App & Connect
  • 🖥️Configuration guides
    • Features
      • Zero Trust Access Control
        • Access Cards
        • Device Posture Check
        • Device Approval
        • Geo Restrictions
      • API Integration
        • API Reference
          • Members
          • Groups
          • Systems
          • Access Cards
          • Relations
          • Gateways
          • Logs
        • Acronis Integration
      • SIEM Integration
      • SSO/SCIM
        • Auth0
        • Cisco Duo
        • Google Workspace
        • JumpCloud
        • Microsoft Entra ID
        • Okta
        • OneLogin
        • Ping Identity
        • Universal (SAML)
      • MFA
      • Passkeys
      • MSI deployment
      • Threat Blocker
      • Custom Domain Blocking
      • DNS Management
      • Split Tunneling
      • Port Forwarding
    • Branch Connector
      • Cisco
      • Cisco Meraki
      • FortiGate
      • MikroTik
      • SonicWall
      • UniFi USG
      • Zyxel Nebula Control Center
      • Other supported routers and firewalls
    • Cloud Connector
      • AWS
      • Google Cloud
      • Microsoft Azure
      • Other Public Cloud providers
    • IP whitelisting
      • APACHE Web Server
      • AWS VPC
      • Azure (Office 365)
      • Google Cloud
      • Google Workspace
      • Magento
      • Microsoft IIS
      • NGINX
        • Domain
        • Subdomain
        • URL
      • OpenCart
      • PHP
      • PHPMyAdmin
      • Pipedrive
      • SalesForce
      • SSH server
      • WordPress
      • Zoho CRM
    • Linux
      • DEB repository
      • RPM repository
      • Manual installation
      • Linux Troubleshooting
  • 🆘FAQ & Troubleshooting
    • FAQ
      • Business
      • Technical
    • Troubleshooting
  • 📓Product Changelog
    • Windows
    • macOS
Powered by GitBook
On this page

Was this helpful?

  1. Configuration guides
  2. Features

Zero Trust Access Control

Take control of your network security with Zero Trust Access Control.

PreviousFeaturesNextAccess Cards

Last updated 6 months ago

Was this helpful?

Zero Trust Access Control is a fundamental component of Zero Trust Network Access (ZTNA), which challenges the traditional notion of trust in network security. Unlike traditional perimeter-based security models that implicitly trust users and devices once they gain access to the network, Zero Trust Access Control operates on the principle of "never trust, always verify."

In a Zero Trust Access Control model, every access attempt is treated as potentially unauthorized until proven otherwise. This approach minimizes the risk of lateral movement and unauthorized access by enforcing strict authentication, authorization, and continuous monitoring mechanisms.

At GoodAccess, we embrace the Zero Trust philosophy and implement it through our comprehensive Zero Trust Access Control solution. It utilizes four key features:

🖥️
Access Cards
Device Posture Check
Device Approval
Geo Restrictions