Reaping the Benefits of Zero Trust

Date:

Trending

The advent of emerging technologies such as robotic process automation, artificial intelligence, and blockchain, as well as heightened security concerns due to the pandemic, bring new cybersecurity risks and challenges.

- Advertisement -

This evolving technology landscape has made it even more imperative for organizations to better manage cybersecurity risks and become security resilient, and many are turning to a Zero Trust approach to do this.

What is Zero Trust?

According to the National Institute of Standards and Technology (NIST), Zero Trust (ZT) refers to an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.

A Zero Trust architecture (ZTA) uses Zero Trust principles to plan industrial and enterprise infrastructure and workflows. Zero Trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership.

Zero Trust is not a tool or a new technology, but a strategic architectural concept, and should be aligned with business objectives.

Why does Zero Trust matter to an organization?

The primary goal of a solid Zero Trust strategy is to extend the control plane from the internal secure assets of the environment as far outward as possible. ZTA is all about “verify, and then trust.”

- Advertisement -

The COVID-19 pandemic has resulted in many organizations shifting to remote working due to the safety risk and government guidelines, like city lockdowns.

As a result, it has impacted nearly every organization’s cybersecurity strategy. This obviously has posed an external issue for cybersecurity leaders on how they could trust personal devices and home networks to be secured in line with the organization’s security policies and procedures.

In many cases, it has become necessary for cybersecurity leaders to consider implementing controls without trusting the resources in the interest of maintaining business continuity. However, many organizations are now reassessing these practices and transitioning where possible to a Zero Trust approach.

Implementing Zero Trust

The newly released ISO / IEC 27002:2022 Information security, cybersecurity and privacy protection – Information security controls standard provides guidance on implementing Zero Trust principles that organizations can consider, such as:

• Assuming the organization’s information systems are already breached and thus not reliant on network perimeter security alone.

• Employing a “never trust and always verify” approach for access to information systems.

• Ensuring that requests to information systems are encrypted end-to-end.

- Advertisement -

• Verifying each request to an information system as if it originated from an open, external network, even if these requests originated internally to the organization.

• Using “least privilege” and dynamic access control techniques. (e.g., authentication information, user identities, data about the user endpoint device, and data classification).

• Always authenticating requesters and always validating authorization requests to information systems based on information (e.g., enforcing strong multi-factor authentication).

Why are boardrooms supporting Identity and Zero-Trust initiatives?

Like any security initiative, Zero Trust requires commitment from the board. Zero Trust should involve the board, the chief information security officer, and other leaders to determine priorities and ensure that they will be effectively implemented across the organization.

In general, boardrooms tend to trust insiders, that is, authorized users, rather than outsiders. However, Zero Trust begins with not differentiating insiders and outsiders. An organization’s existing controls may not suffice to address new cybersecurity risks and it may need to implement additional and/or new controls.

Zero Trust is built on the premise that trust cannot be granted forever and needs to be evaluated on a continual basis. Today, many boardrooms are already driving the change and supporting identity and ZT.

Many boardrooms are convinced of the value of ZT after realizing these business benefits:

• Reduction in overall cost and expenditures.

• Reduction in the scope of requirements for compliance related to cybersecurity, as it entails accurately mapping assets, inventories, and data, which decreases the risk of unauthorized access.

• Greater control in the cloud environment through authorized workloads.

• Lower breach potential through verified and approved communications.

• Lower compliance risk.

• Business agility and speed.

• More streamlined user experience, allowing users to be less encumbered by security as part of their daily job.

Summary

In summary, achieving Zero Trust does not require the adoption of any new technologies. It’s simply a new approach to cybersecurity to “never trust, always verify,” or to eliminate any and all trust, as opposed to the more traditional perimeter-based security approach that assumes user identities have not been compromised, and all human actors are responsible and can be trusted.

Zero Trust does not eliminate trust completely but uses technologies to enforce the principle that no user and no resource has access until it has been proven it can and should be trusted—and in the process, strengthen cybersecurity defenses.

THE SNAPSHOTS, IN YOUR INBOX

Get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

Support our independent journalism PayPal (Outside India) For PayU (For Indian Readers).

Chetan Anand
Chetan Anand
Chetan Anand is Associate Vice President of Information Security and CISO at Profinch Solutions.

More Latest Stories

More Articles

LTC UPDATE: Gate io Lists Litecoin Under Meme Coins

US-based cryptocurrency exchange platform Gate.io has listed Litecoin (LTC) under its meme coin category. The announcement was made on Friday via the company’s official Twitter...

Pokarna Engineered Stone Limited Commits Rs 440 Crores for New Bretonstone Line

Pokarna Engineered Stone Limited (PESL) said on Tuesday it will invest Rs. 440 crore to expand production capabilities at its Mekaguda facility in Telangana. The expansion will include a third Bretonstone production line, developed by Italy's Breton S.p.A., and is expected to be operational...

Coinbase launches COIN50 Index To Track Top 50 Cryptos On its Exchange

Leading crypto trading platform Coinbase on Tuesday announced the launch of the Coinbase 50...

Donald Trump To Shut Department of Education; Plans To Shift Responsibilities To States

President-elect Donald Trump announced on Monday that his administration intends to close the Department...
00:01:10

Tom Homan Old Video Goes Viral, After Donald Trump Taps Him As Border Czar

An old video of Tom Homan, former acting head of US Immigration and Customs...
00:04:07

Protests Erupts in Valencia Over Deadly Floods in Eastern Spain

Over ten thousand people took to the streets of Valencia to protest against the...

Why BITBinvest.com is Expanding Worldwide & Capturing High-Profile Trader’s Attention?

BITBinvest.com has rapidly emerged as one of the leading companies in online trading, making...

4 Key Ways Robotics May Change Warehouse Operations by 2030

The landscape of warehouse operations is poised for significant transformation by 2030 with the...
00:01:42

The Trump Effect: Crypto Market Hits $3 Trillion Market Cap; Bitcoin Surges $87K, While Ethereum Stood At $3k

Following Donald Trump's presidential election victory, the cryptocurrency market surged, reaching a whopping $3.02 trillion market cap on Tuesday—up 6.86% from the previous day....

VIDEO: Israeli PM Netanyahu Visits Lebanese Border, Promises Strong Action Against Hezbollah

During a recent visit to the Lebanese border, Israel's Prime Minister Benjamin Netanyahu highlighted...

“I Will End the War in Gaza,” Kamala Harris to Arab American Community

In a final bid to win over Arab American voters in the closing stages...

A Connected GRC Approach is a Strategic Imperative for Modern Businesses

The approach to implementing GRC is rapidly evolving globally. The reason? Adapting to today’s...

Finzilo Review | 8 Trading Features That Make Finzilo Stand Out

When it comes to online trading platforms, choosing the right one can significantly impact...
00:03:45

US President Biden Apologies To Native Indians For Horrific Boarding School Policy

During a visit to the Gila River Indian Community in Arizona, President Joe Biden issued a formal apology for the United States' 150-year boarding...

Kriya: PM Netanyahu Closely Monitors ‘Military Operations’ On Iran

The Israeli Prime Minister's Office has released a new video showing Prime Minister Benjamin Netanyahu and Defense Minister Yoav Gallant closely monitoring the ongoing strikes on Iran from the Israel Military command center in Kriya.

Iran Should Not Respond To Israeli Attack: UK PM Keir Starmer

The United Kingdom's Prime Minister Keir Starmer has requested Iran to avoid retaliation after...

APP Reviews: Bengali Betting Sites

Recognizing the increasing demand for an exhilarating and convenient gambling experience in the Bengali...
00:00:00

Live From Parliament: UK Deputy PM Angela Rayner takes PMQs

London News: The United Kingdom (UK) deputy prime minister Angela Rayner takes questions from...
00:00:21

‘Not Our King’ Australian Politician Lidia Thorpe Heckled King Charles

Following King Charles' keynote speech in the Australian parliament, Senator Lidia Thorpe accused the...

Live: UN Security Council Meeting on Russia Ukraine Security

The members of the United Nations Security Council met on Monday to discuss the...

Rethinking IT Infrastructure in the AI era

The IT infrastructure landscape is undergoing significant changes in the AI era. Adopting AI...

Harnessing Market Movements: Strategic Index Trading for Diversified Portfolios

As global financial markets continue to evolve, index trading has become a key focus...

Leveraging AI in Press Release Distribution: The Future of PR

Over the years the field of Public Relations (PR) has undergone significant transformation with...

Serhii Tokarev’s Strategies for Improving Math Education in Ukraine

Mathematics is essential in many areas of life, from technology and space exploration to...

A Connected GRC Approach is a Strategic Imperative for Modern Businesses

The approach to implementing GRC is rapidly evolving globally. The reason? Adapting to today’s...

Interactive Learning: Elevating Concept Clarity Through Online Education

In today’s digital age, virtual learning has taken center stage, with live online lessons...

Vehant Technologies’ Shailendra Kumar Singh On Leveraging AI To Tackle India’s Traffic Challenges

During an interview with our editorial team, Shailendra Kumar Singh, Business Unit Head ,...

Russian Producers Ready to Increase Fertilizer Supplies to India

Moscow, Russia: Russian companies are ready to increase fertilizer supplies to India, but the...

TVS Motor Achieves Highest Ever Revenue and Profits in Q2

TVS Motor Company posts highest ever operating revenue of Rs. 9,228 Crores registering a...

Finzilo Review | 8 Trading Features That Make Finzilo Stand Out

When it comes to online trading platforms, choosing the right one can significantly impact...

Leveraging AI in Press Release Distribution: The Future of PR

Over the years the field of Public Relations (PR) has undergone significant transformation with...

Identifying the Key Loopholes in the Current Digital Wallets

Digital wallets have evolved to meet the demands of decentralized solutions built with blockchain...

Serhii Tokarev’s Strategies for Improving Math Education in Ukraine

Mathematics is essential in many areas of life, from technology and space exploration to...