security

Zero trust security – London Daily News


Security professionals who’ve been in the game a while have seen a lot. The aughts were all about strong passwords, firewalls and antivirus, and keeping software patched. Then requirements such as the Health Insurance Portability and Accountability Act (HIPAA) and Payment Card Industry Data Security Standard (PCI DSS) shifted focus to data-specific protection measures, including identity-based access controls and encryption. Cloud and mobile devices brought more new tools, processes, and training.

Of course, attackers evolved their strategies, too. In response, proactive organisations are increasingly using zero trust principles to strengthen their security postures and protect assets from unauthorised access and manipulation they’re hewing to a “never trust, always verify” stance that uses granular segmentation to limit the attack surface and makes the assumption that the enemy is already inside the gate.

What Is Zero Trust Security?

A zero-trust security model uses frequent user authentication and authorisation to protect assets while continuously monitoring for signs of breaches. Segmentation is used to limit the data and assets that an entity can access without reauthenticating. Because zero trust presumes the network has been penetrated by a threat agent, security measures are implemented in depth, rather than simply at the perimeter the “castle and moat” model.

Zero trust security, also known as a zero-trust architecture or perimeter less security, assumes no one and no device or application is universally trusted, whether inside or outside the network. Continuous verification is required. That access is granted based on the context of the request, the level of trust, and the sensitivity of the asset. A zero-trust architecture is especially effective for organisations that use cloud applications and have lots of remote workers and locations.

Read More   ONCE chooses Telefónica Tech to migrate its services to the Cloud - Telefónica

How Does Zero Trust Work?

Zero trust works by simply never implicitly trusting a request for data, applications, or resources and assuming the requester could be a bad actor. When you look at security through that lens, the result is new levels of granularity in tools and policies. Developing a zero-trust security architecture starts with identifying sensitive data and critical applications as well as authorised users and data flows. There is a control plane, consisting of a policy controller, and automation and orchestration are critical. There’s no way IT teams alone can achieve the needed level of vigilance. That takes an integrated approach as well as AI/ML.

A zero-trust architecture follows six tenets as laid out by NIST.

  • All data sources and computing services are considered resources that require security considerations. Nothing is to be left unsecured.
  • All communication must be secure regardless of network location; network location does not imply trust.
  • Access to individual enterprise resources is granted on a per-connection basis; trust in the requester is evaluated before the access is granted.
  • Access to resources is determined by policy, including the observable state of user identity and the requesting system. Evaluation may include other behavioural attributes.
  • The organisation ensures all owned and associated systems are in the most secure state possible and will monitor systems to ensure that they remain that way.
  • User authentication is dynamic and strictly enforced before access is allowed; this is a constant cycle of access, scanning and assessing threats, adapting, and authenticating.

Why Is a Zero Trust Model Important?

A zero-trust model is important because the traditional approach of giving free rein to users and devices within an implicit trust zone or when connected via a VPN is simply not working. These outdated perimeter defence models are failing to secure our data because organisational boundaries are no longer limited to on-premises systems. Remote workers and mobile devices are external to the network perimeter, and adoption of cloud technologies further expands the security boundary. Meanwhile, cyberattacks continue to become more complex and impactful. A successful ransomware attack can cripple an organization, resulting in the loss of critical functionality and exposing sensitive information. No organisation is immune attackers have successfully ransomed large companies, municipalities, and even hospitals. It’s crucial to adopt a more aggressive approach to securing our systems and data.

Read More   Google TAG Warns of Russian Hackers Conducting Phishing Attacks in Ukraine

As the use of cloud services rapidly expands, it also creates new targets for cybercriminals. A popular exploit is to steal or guess the credentials of a privileged administrator or application, then move freely throughout the network. A zero trust implementation makes it possible to granularly regulate access to systems, networks, and data. That’s why an increasing number of organisations are moving to a zero trust security model to reduce the risk of data breach, detect cybersecurity incidents, and prevent damage from cyberattacks.

Challenges in Implementing Zero-Trust.

While Zero-Trust offers significant benefits, its implementation is not without challenges:

Complexity: Transitioning to a Zero-Trust model requires a complete overhaul of existing security infrastructure, which can be complex and time-consuming.

Cost: Implementing Zero-Trust often involves significant upfront costs for new technologies and training.

Cultural Resistance: Employees and stakeholders may resist the change, especially if it introduces additional steps for accessing resources.

Integration with Legacy Systems: Many organisations still rely on legacy systems that may not be compatible with Zero-Trust principles.

The Future of Zero-Trust Security.

As cyber threats continue to evolve, Zero-Trust Security is poised to become the standard for modern cybersecurity. According to Gartner, by 2025, 60% of organisations will have adopted Zero-Trust as a starting point for their security strategies. Advances in AI, machine learning, and automation will further enhance the effectiveness of Zero-Trust frameworks, making them more accessible and easier to implement.

In conclusion, Zero-Trust Security represents a fundamental shift in how organizations approach cybersecurity. By assuming that no user or device can be trusted by default, Zero-Trust provides a robust defence against today’s complex threat landscape. While the journey to Zero-Trust may be challenging, the benefits of enhanced security, compliance, and resilience make it a worthwhile investment for any organisation.

Read More   188th Security Forces Squadron Airmen Experience Nighttime and ... - DVIDS

Feature Image : https://www.infosectrain.com/

About Author.
Samuel Akerele.

Samuel Akerele is Cybersecurity Lead at Vuhosi . He is a skilled Cybersecurity Analyst, provides Technical Support, Database Management, Vulnerability management, Incident response, and Disaster recovery planning. As a dedicated member of the Microsoft Community Contributor program and CyBlack CISCO Academy, he is committed to continuous professional development and sharing knowledge within the tech community.

Linkedin: https://www.linkedin.com/in/samuel-akerele-43949082/

 



READ SOURCE

This website uses cookies. By continuing to use this site, you accept our use of cookies.