Commitment to Security-First System Design
We trust nothing and verify everything. In a world of increasing cyber threats, evolving attack vectors, and distributed architectures, security cannot be assumed - it must be continuously validated. We embrace a Zero Trust Architecture (ZTA) where every request, identity, and system interaction is authenticated, authorised, and monitored, regardless of whether it originates inside or outside our network. By adopting a security-first mindset, we ensure that our systems are protected by default, resilient to threats, and adaptive to evolving risks.
What This Means
Every system, application, and process must be designed with Zero Trust principles from the ground up. Security is never implicit - it must be explicitly enforced at every layer.
Our commitment to Zero Trust Architecture is built on:
Why This Matters
Traditional perimeter-based security models are no longer sufficient in an era of cloud, remote work, and sophisticated cyber threats. By implementing Zero Trust principles, we:
Our Expectation
All teams must adopt a Zero Trust mindset, ensuring that security is proactively validated at every level of our technology ecosystem. Leaders must prioritise identity, access management, and continuous monitoring, ensuring that security remains dynamic, adaptive, and aligned with evolving risks.
To support this policy, Zero Trust frameworks, automated security controls, and identity-driven access models will be embedded into our engineering and operational practices, ensuring that security is always enforced without compromising agility. By making Zero Trust Architecture a core principle, we strengthen our security posture, protect our data, and ensure safer, more resilient operations - delivering Better Value Sooner Safer Happier.
This policy establishes Zero Trust as a security standard, ensuring that every access request and system interaction is continuously verified and protected.