Reaping the Benefits of Zero Trust

Date:

Trending

The advent of emerging technologies such as robotic process automation, artificial intelligence, and blockchain, as well as heightened security concerns due to the pandemic, bring new cybersecurity risks and challenges.

This evolving technology landscape has made it even more imperative for organizations to better manage cybersecurity risks and become security resilient, and many are turning to a Zero Trust approach to do this.

What is Zero Trust?

According to the National Institute of Standards and Technology (NIST), Zero Trust (ZT) refers to an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.

A Zero Trust architecture (ZTA) uses Zero Trust principles to plan industrial and enterprise infrastructure and workflows. Zero Trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership.

Zero Trust is not a tool or a new technology, but a strategic architectural concept, and should be aligned with business objectives.

Why does Zero Trust matter to an organization?

The primary goal of a solid Zero Trust strategy is to extend the control plane from the internal secure assets of the environment as far outward as possible. ZTA is all about “verify, and then trust.”

The COVID-19 pandemic has resulted in many organizations shifting to remote working due to the safety risk and government guidelines, like city lockdowns.

As a result, it has impacted nearly every organization’s cybersecurity strategy. This obviously has posed an external issue for cybersecurity leaders on how they could trust personal devices and home networks to be secured in line with the organization’s security policies and procedures.

In many cases, it has become necessary for cybersecurity leaders to consider implementing controls without trusting the resources in the interest of maintaining business continuity. However, many organizations are now reassessing these practices and transitioning where possible to a Zero Trust approach.

Implementing Zero Trust

The newly released ISO / IEC 27002:2022 Information security, cybersecurity and privacy protection – Information security controls standard provides guidance on implementing Zero Trust principles that organizations can consider, such as:

• Assuming the organization’s information systems are already breached and thus not reliant on network perimeter security alone.

• Employing a “never trust and always verify” approach for access to information systems.

• Ensuring that requests to information systems are encrypted end-to-end.

• Verifying each request to an information system as if it originated from an open, external network, even if these requests originated internally to the organization.

• Using “least privilege” and dynamic access control techniques. (e.g., authentication information, user identities, data about the user endpoint device, and data classification).

• Always authenticating requesters and always validating authorization requests to information systems based on information (e.g., enforcing strong multi-factor authentication).

Why are boardrooms supporting Identity and Zero-Trust initiatives?

Like any security initiative, Zero Trust requires commitment from the board. Zero Trust should involve the board, the chief information security officer, and other leaders to determine priorities and ensure that they will be effectively implemented across the organization.

In general, boardrooms tend to trust insiders, that is, authorized users, rather than outsiders. However, Zero Trust begins with not differentiating insiders and outsiders. An organization’s existing controls may not suffice to address new cybersecurity risks and it may need to implement additional and/or new controls.

Zero Trust is built on the premise that trust cannot be granted forever and needs to be evaluated on a continual basis. Today, many boardrooms are already driving the change and supporting identity and ZT.

Many boardrooms are convinced of the value of ZT after realizing these business benefits:

• Reduction in overall cost and expenditures.

• Reduction in the scope of requirements for compliance related to cybersecurity, as it entails accurately mapping assets, inventories, and data, which decreases the risk of unauthorized access.

• Greater control in the cloud environment through authorized workloads.

• Lower breach potential through verified and approved communications.

• Lower compliance risk.

• Business agility and speed.

• More streamlined user experience, allowing users to be less encumbered by security as part of their daily job.

Summary

In summary, achieving Zero Trust does not require the adoption of any new technologies. It’s simply a new approach to cybersecurity to “never trust, always verify,” or to eliminate any and all trust, as opposed to the more traditional perimeter-based security approach that assumes user identities have not been compromised, and all human actors are responsible and can be trusted.

Zero Trust does not eliminate trust completely but uses technologies to enforce the principle that no user and no resource has access until it has been proven it can and should be trusted—and in the process, strengthen cybersecurity defenses.

THE SNAPSHOTS, IN YOUR INBOX

Get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

Support our independent journalism PayPal (Outside India) For PayU (For Indian Readers).

Chetan Anand
Chetan Anand
Chetan Anand is Associate Vice President of Information Security and CISO at Profinch Solutions.

More Latest Stories

More Articles

Relata’s Hyper-Realism: CEO Samudragupta Talukdar On Personalized Home Buying Experiences

In an exclusive conversation with TechGraph, Samudragupta Talukdar, Founder and CEO of Relata, a real estate technology company, outlined how the company is reshaping...

Godrej Capital’s Gen AI Plan: CTO Jyothirlatha B on SAKSHAM AI and the Future of Financial Services

Speaking to TechGraph, Godrej Capital CTO Jyothirlatha B shared how the company is harnessing GenAI to accelerate credit assessments and enhance customer service. She also discussed the upcoming launch of SAKSHAM AI, a platform designed to streamline operations and boost efficiency across credit management,...

Preparing for a Data-Driven Future: How the GRE Assesses Academic and Analytical Readiness

As sectors such as artificial intelligence (AI) and machine learning continue to grow and...

Exploring the broad appeal of football: from fashion to video games

Football, often called the world's game, goes far beyond the pitch. Its influence extends...

BProTrade: Global Expansion Explained

December 2024 marks a pivotal time in the world of online trading. With Bitcoin...

How Generative AI is Shaping Voicebot Capabilities

The advent of Generative AI is here to revolutionize the technological landscape and reimagine...

‘Historic day for the Middle East’: PM Netanyahu On Syria’s Assad Regime Collapse

Israeli Prime Minister Benjamin Netanyahu, in a video statement released on Sunday, described the...

Decentralizing Cardiac Care: Sunfox Technologies’ Rajat Jain on the Spandan ECG Impact

During an interview with the TechGraph editorial team, Sunfox Technologies' Founder and CEO, Rajat...

Neon54 Casino Review: A Vibrant Gaming Experience

When it comes to striking the perfect balance between entertainment and innovation, Neon54 Casino hits all the right notes. This online casino, licensed by...

Boson Whitewater, Citadines OMR Chennai to Launch First-of-its-Kind Wastewater Recycling System

Boson Whitewater, a water utility company that converts STP-treated water into high-quality potable water,...

Jungle Camps India Limited Sets IPO Price Band at ₹68-₹72 per Share

Jungle Camps India Limited (JCIL), an India-based ecological hospitality service provider on Thursday announced...

Crypto Market Crosses $3.08 Trn, Bitcoin Hits $91,616, Litecoin Drops Below $90

The cryptocurrency market surged to a total valuation of $3.08 trillion on Monday, with...
00:56:42

Plan for Change: UK PM Keir Starmer Outlines Six Point Plans for Housing, NHS, Policing, and More

London, UK — The United Kindom PM and Labour Party leader Keir Starmer on...

Top Trends in Web3 Platforms for Forward-Thinking Entrepreneurs

The digital landscape is evolving rapidly, and Web3 platforms are leading this transformation. For forward-thinking entrepreneurs, staying informed about these technological trends is essential...

Benjamin Netanyahu: Thank You President Donald Trump for Calling Hamas to Release Hostages

Israeli Prime Minister Benjamin Netanyahu on Tuesday expressed his gratitude to U.S. President-Elect Donald Trump for his recent call for Hamas to release hostages. https://open.spotify.com/episode/6xpUQdGpNQUkwHNPXP7WgP?si=ro44gKgxR1yn6qBbj6iXpw "I want to thank President Trump for his strong statement yesterday about the need for Hamas to release the hostages," Netanyahu...

Titan Intech Ltd To Secure Rs 200 Cr via NCDs

Titan Intech Limited, a BSE-listed company specializing in Embedded Manufacturing Services (EMS) for OEM/ODM...

Ensuring Fair Play: AIGF CEO Roland Landers on Promoting Skill-Based Gaming in India

During an interview with TechGraph, Roland Landers, CEO of the All India Gaming Federation...

Discover the Features of Melbet’s Mobile App for Indian Bettors

The Melbet mobile application has been designed to cater to the growing community of...

How AI is Transforming Traditional Business Roles

Artificial Intelligence has already had a significant impact on businesses and has made data-driven...

The Impact of Real-Time Market Data Solutions on Informed Trading Decisions

The world of finance isn’t stagnant; it is dynamic and ever-evolving. Every second, a...

AI and Workplace Equality for Women in the Digital Era

As society heads toward an age dominated by technology, a key question remains: will...

WeVOIS Lab’s Abhinav Vashistha On Shaping the Future of Waste Management with AI

During an interview with TechGraph, Abhinav Vashistha, Co-Founder of WeVOIS Lab, discusses how it...

The Hidden World of Mega888 APK: What Casual Players Are Missing Out On

Mega888 APK is well-known among online casino enthusiasts for its thrilling games and easy-to-navigate...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national...

Crypto Market Crosses $3.08 Trn, Bitcoin Hits $91,616, Litecoin Drops Below $90

The cryptocurrency market surged to a total valuation of $3.08 trillion on Monday, with...

The Evolution of Gaming: From Traditional to Immersive Online Experiences

Gaming has undergone a remarkable transformation over the decades, evolving from basic, tactile forms...

The Role of Health Plans with Preventive Care in Reducing Financial Risk

In an era where healthcare costs are spiraling and chronic conditions are on the...

Best Trading Platforms for Forex: An In-Depth Guide

If you’re looking to dive into forex trading, choosing the right trading firms are...

Unexpected Tips To Help Maintain Your Vehicle’s Condition

When it comes to prolonging the life of your vehicle, the condition of your...
00:56:42

Plan for Change: UK PM Keir Starmer Outlines Six Point Plans for Housing, NHS, Policing, and More

London, UK — The United Kindom PM and Labour Party leader Keir Starmer on...

The Hidden World of Mega888 APK: What Casual Players Are Missing Out On

Mega888 APK is well-known among online casino enthusiasts for its thrilling games and easy-to-navigate...

The Importance of Zero-Trust Security Models in Safeguarding Data

In an age where cyberattacks grow more sophisticated by the day, traditional security models...

Indusface Launches CyberShiksha program to Educate Students on Cybersecurity

Indusface, a leading application security provider for SaaS solutions, has launched CyberShiksha, a national...