Guarding Against Trust Exploitation
Trust exploitation attacks can be mitigated through tight network access control and tight constraints on trust levels within a network. Systems in the DMZ should never be fully trusted by internal systems and the trust should be based on something other than the IP address of the trusted host.
