Reaping the Benefits of Zero Trust

Date:

Trending

- Advertisement -

The advent of emerging technologies such as robotic process automation, artificial intelligence, and blockchain, as well as heightened security concerns due to the pandemic, bring new cybersecurity risks and challenges.

This evolving technology landscape has made it even more imperative for organizations to better manage cybersecurity risks and become security resilient, and many are turning to a Zero Trust approach to do this.

What is Zero Trust?

- Advertisement -

According to the National Institute of Standards and Technology (NIST), Zero Trust (ZT) refers to an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.

A Zero Trust architecture (ZTA) uses Zero Trust principles to plan industrial and enterprise infrastructure and workflows. Zero Trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership.

- Advertisement -

Zero Trust is not a tool or a new technology, but a strategic architectural concept, and should be aligned with business objectives.

Why does Zero Trust matter to an organization?

The primary goal of a solid Zero Trust strategy is to extend the control plane from the internal secure assets of the environment as far outward as possible. ZTA is all about “verify, and then trust.”

The COVID-19 pandemic has resulted in many organizations shifting to remote working due to the safety risk and government guidelines, like city lockdowns.

As a result, it has impacted nearly every organization’s cybersecurity strategy. This obviously has posed an external issue for cybersecurity leaders on how they could trust personal devices and home networks to be secured in line with the organization’s security policies and procedures.

In many cases, it has become necessary for cybersecurity leaders to consider implementing controls without trusting the resources in the interest of maintaining business continuity. However, many organizations are now reassessing these practices and transitioning where possible to a Zero Trust approach.

Implementing Zero Trust

The newly released ISO / IEC 27002:2022 Information security, cybersecurity and privacy protection – Information security controls standard provides guidance on implementing Zero Trust principles that organizations can consider, such as:

• Assuming the organization’s information systems are already breached and thus not reliant on network perimeter security alone.

• Employing a “never trust and always verify” approach for access to information systems.

• Ensuring that requests to information systems are encrypted end-to-end.

• Verifying each request to an information system as if it originated from an open, external network, even if these requests originated internally to the organization.

• Using “least privilege” and dynamic access control techniques. (e.g., authentication information, user identities, data about the user endpoint device, and data classification).

• Always authenticating requesters and always validating authorization requests to information systems based on information (e.g., enforcing strong multi-factor authentication).

Why are boardrooms supporting Identity and Zero-Trust initiatives?

Like any security initiative, Zero Trust requires commitment from the board. Zero Trust should involve the board, the chief information security officer, and other leaders to determine priorities and ensure that they will be effectively implemented across the organization.

In general, boardrooms tend to trust insiders, that is, authorized users, rather than outsiders. However, Zero Trust begins with not differentiating insiders and outsiders. An organization’s existing controls may not suffice to address new cybersecurity risks and it may need to implement additional and/or new controls.

Zero Trust is built on the premise that trust cannot be granted forever and needs to be evaluated on a continual basis. Today, many boardrooms are already driving the change and supporting identity and ZT.

Many boardrooms are convinced of the value of ZT after realizing these business benefits:

• Reduction in overall cost and expenditures.

• Reduction in the scope of requirements for compliance related to cybersecurity, as it entails accurately mapping assets, inventories, and data, which decreases the risk of unauthorized access.

• Greater control in the cloud environment through authorized workloads.

• Lower breach potential through verified and approved communications.

• Lower compliance risk.

• Business agility and speed.

• More streamlined user experience, allowing users to be less encumbered by security as part of their daily job.

Summary

In summary, achieving Zero Trust does not require the adoption of any new technologies. It’s simply a new approach to cybersecurity to “never trust, always verify,” or to eliminate any and all trust, as opposed to the more traditional perimeter-based security approach that assumes user identities have not been compromised, and all human actors are responsible and can be trusted.

Zero Trust does not eliminate trust completely but uses technologies to enforce the principle that no user and no resource has access until it has been proven it can and should be trusted—and in the process, strengthen cybersecurity defenses.

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

- Advertisement -
Chetan Anand
Chetan Anand
Chetan Anand is Associate Vice President of Information Security and CISO at Profinch Solutions.

More Latest Stories

More Articles

Ethnic Wear Brand Alaya By Stage3 Raises Seed Funding Led by LC Nueva AIF

Gurugram-based Alaya By Stage3, a modern Indian wear brand operated by Cosmo Brands, has raised an undisclosed seed funding round led by LC Nueva...

Refurbished Electronics Platform Grest Secures FDI from Japan’s ICMG in Pre-Series A Round

Grest, an India-based premium refurbished electronics platform, has secured foreign direct investment from ICMG as part of its ongoing undisclosed Pre-Series A funding round, marking its first overseas investment. The development comes as India’s refurbished electronics market continues to formalise, with industry estimates pointing to...

Random video chat: what it is, how it works, and why people use it

In an era where connecting with others online has become part of everyday life,...

The IoT Platform Market Just Consolidated: Smart Integrators Are Looking Elsewhere

Three platforms changed owners in 15 months. Your stack didn't change. Your risk profile did.

Meta Platforms, Broadcom Partners to Co-Develop Multi-Gen Silicon AI Chips

Facebook parent Meta Platforms (NASDAQ: META) has expanded its partnership with Broadcom to co-develop...

Practo Names Srijesh Kumar as Global CPTO

India-based online doctor consulting platform, Practo has announced the appointment of Srijesh Kumar as...

Matrix Geo Solutions Wins ₹5.14 Crore Narmada Survey Project from MPSEDC

Matrix Geo Solutions Limited has received a Letter of Acceptance (LoA) from Madhya Pradesh...

Why Reliability and Security Are the New Differentiators in Enterprise Tech

For years, enterprises competed on features, scale, and speed. Today, the real differentiator is...

How Home-Based Healthcare is Improving Medical Accessibility Across India

The Indian health care industry has seen considerable transformation in recent times, primarily due to changes in patient demand and an increasing need for...

Mytek Launches Reverse Auction Model, Reports ₹48.29 Crore Revenue

Mumbai-based commerce platform Mytek on Tuesday launched a reverse auction model, introducing a bidding-based...

Trump Accuses Iran of Breaching Ceasefire, Warns Over Strait of Hormuz Transit

The US President Donald Trump has accused Iran of failing to allow adequate oil...

VES College of Architecture’s Dr. Prof. Anand Achari on Preparing Students for Real Urban Challenges with AI and Design Thinking

Speaking with TechGraph, Principal of VES College of Architecture (VESCOA), Dr. Prof. Anand Achari,...

Cisco Appoints Pete Shimer to Board, Daniel Schulman to Step Down

Cisco Systems (NASDAQ:CSCO) has appointed Pete A. Shimer to its board of directors, while...

Cisco Director Pete Shimer Files Initial Ownership Disclosure with SEC

Cisco Systems (NASDAQ: CSCO) board member Pete A. Shimer has filed an initial statement of beneficial ownership with the U.S. Securities and Exchange Commission...

8B, PayU Partner to Enable UPI Payments for Indian Users Across Central Asia

Central Asian fintech infrastructure company 8B has partnered with PayU Payments to enable UPI and other Indian payment options for merchants across Central Asia, marking a step towards building a cross-border payments corridor between India and the region. Under the partnership, PayU’s APIs will be...

Cisco Report: Cybersecurity Remains Top Challenge as Industrial AI Adoption Expands

Cisco Systems (NASDAQ:CSCO) has released its latest State of Industrial AI Report, highlighting how...

Motilal Oswal Alternates leads $280 Mn Series E Round for KreditBee

India based digital lending platform KreditBee (KrazyBee Services PVT Ltd) has raised $280 million...

Evolving Practices in Industrial Operations and Infrastructure

Industrial operations and infrastructure continue to evolve as organizations adapt to new technologies, regulatory...

SatLeo Labs Raises $2.2 Mn Seed Round Led by Unicorn India Ventures

SatLeo Labs, a Gujarat-based space tech startup focused on capturing high-resolution thermal and visible...

How Graphics on Cars Can Boost Your Business

In today's competitive market, businesses are constantly looking for innovative ways to stand out...

How Modern Technology Enhances Efficiency and Performance of Residential HVAC Systems

Modern technology has revolutionized many aspects of our daily lives, and residential HVAC systems...

Vanguard Reports Stake Below 5% in Google’s Alphabet

The Vanguard Group has reported that it now holds less than a 5 percent...

Vanguard Group Reports Ownership Below 5% in Apple Following Internal Realignment

The Vanguard Group has reported that it now holds less than a 5% stake...

NIELIT, SKD University Sign MoU to Expand AI, Cyber Security and Data Science Education in Rajasthan

The National Institute of Electronics and Information Technology (NIELIT) and Shri Khushal Das University...

VES College of Architecture’s Dr. Prof. Anand Achari on Preparing Students for Real Urban Challenges with AI and Design Thinking

Speaking with TechGraph, Principal of VES College of Architecture (VESCOA), Dr. Prof. Anand Achari,...

Cisco Appoints Pete Shimer as its board of directors

American multinational technology conglomerate, Cisco Inc (NASDAQ: CSCO) on Tuesday announced the appointment of...

Cambodia Installs Statue Honouring Mine Detection Rat Magawa

Magawa, a landmine detecting rat who was awarded a gold medal for his service,...

ASLI Appoints Rajagopal G as Chairman for 2026–28 Term

Association of Senior Living India (ASLI) has announced the appointment of Rajagopal G as...

realme Launches realme 16 5G in India with Dual 50MP Cameras, 7000mAh Battery

With a bid to strengthen its position in the mid range segment, realme has...

Cisco Appoints Pete Shimer to Board, Daniel Schulman to Step Down

Cisco Systems (NASDAQ:CSCO) has appointed Pete A. Shimer to its board of directors, while...

Vanguard Group Reports Ownership Below 5% in Apple Following Internal Realignment

The Vanguard Group has reported that it now holds less than a 5% stake...

Concord Control Systems Secures INR 84 Cr Order From Indian Railways For Loco Wireless Control Systems

Concord Control Systems Limited (BSE: CNCRD), a manufacturer of embedded electronic systems and a...

NIELIT, SKD University Sign MoU to Expand AI, Cyber Security and Data Science Education in Rajasthan

The National Institute of Electronics and Information Technology (NIELIT) and Shri Khushal Das University...