Reaping the Benefits of Zero Trust

Date:

Trending

- Advertisement -

The advent of emerging technologies such as robotic process automation, artificial intelligence, and blockchain, as well as heightened security concerns due to the pandemic, bring new cybersecurity risks and challenges.

This evolving technology landscape has made it even more imperative for organizations to better manage cybersecurity risks and become security resilient, and many are turning to a Zero Trust approach to do this.

- Advertisement -

What is Zero Trust?

According to the National Institute of Standards and Technology (NIST), Zero Trust (ZT) refers to an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.

A Zero Trust architecture (ZTA) uses Zero Trust principles to plan industrial and enterprise infrastructure and workflows. Zero Trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership.

- Advertisement -

Zero Trust is not a tool or a new technology, but a strategic architectural concept, and should be aligned with business objectives.

Why does Zero Trust matter to an organization?

The primary goal of a solid Zero Trust strategy is to extend the control plane from the internal secure assets of the environment as far outward as possible. ZTA is all about “verify, and then trust.”

The COVID-19 pandemic has resulted in many organizations shifting to remote working due to the safety risk and government guidelines, like city lockdowns.

- Advertisement -

As a result, it has impacted nearly every organization’s cybersecurity strategy. This obviously has posed an external issue for cybersecurity leaders on how they could trust personal devices and home networks to be secured in line with the organization’s security policies and procedures.

In many cases, it has become necessary for cybersecurity leaders to consider implementing controls without trusting the resources in the interest of maintaining business continuity. However, many organizations are now reassessing these practices and transitioning where possible to a Zero Trust approach.

Implementing Zero Trust

The newly released ISO / IEC 27002:2022 Information security, cybersecurity and privacy protection – Information security controls standard provides guidance on implementing Zero Trust principles that organizations can consider, such as:

• Assuming the organization’s information systems are already breached and thus not reliant on network perimeter security alone.

• Employing a “never trust and always verify” approach for access to information systems.

• Ensuring that requests to information systems are encrypted end-to-end.

• Verifying each request to an information system as if it originated from an open, external network, even if these requests originated internally to the organization.

• Using “least privilege” and dynamic access control techniques. (e.g., authentication information, user identities, data about the user endpoint device, and data classification).

• Always authenticating requesters and always validating authorization requests to information systems based on information (e.g., enforcing strong multi-factor authentication).

Why are boardrooms supporting Identity and Zero-Trust initiatives?

Like any security initiative, Zero Trust requires commitment from the board. Zero Trust should involve the board, the chief information security officer, and other leaders to determine priorities and ensure that they will be effectively implemented across the organization.

In general, boardrooms tend to trust insiders, that is, authorized users, rather than outsiders. However, Zero Trust begins with not differentiating insiders and outsiders. An organization’s existing controls may not suffice to address new cybersecurity risks and it may need to implement additional and/or new controls.

Zero Trust is built on the premise that trust cannot be granted forever and needs to be evaluated on a continual basis. Today, many boardrooms are already driving the change and supporting identity and ZT.

Many boardrooms are convinced of the value of ZT after realizing these business benefits:

• Reduction in overall cost and expenditures.

• Reduction in the scope of requirements for compliance related to cybersecurity, as it entails accurately mapping assets, inventories, and data, which decreases the risk of unauthorized access.

• Greater control in the cloud environment through authorized workloads.

• Lower breach potential through verified and approved communications.

• Lower compliance risk.

• Business agility and speed.

• More streamlined user experience, allowing users to be less encumbered by security as part of their daily job.

Summary

In summary, achieving Zero Trust does not require the adoption of any new technologies. It’s simply a new approach to cybersecurity to “never trust, always verify,” or to eliminate any and all trust, as opposed to the more traditional perimeter-based security approach that assumes user identities have not been compromised, and all human actors are responsible and can be trusted.

Zero Trust does not eliminate trust completely but uses technologies to enforce the principle that no user and no resource has access until it has been proven it can and should be trusted—and in the process, strengthen cybersecurity defenses.

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

- Advertisement -
Chetan Anand
Chetan Anand
Chetan Anand is Associate Vice President of Information Security and CISO at Profinch Solutions.

More Latest Stories

More Articles

As Crypto Markets Mature the OpenSea Insider Trading Case Still Shapes Governance Debates

When federal prosecutors charged former OpenSea employee Nathaniel Chastain in June 2022, the case was widely described as the first major insider trading prosecution...

How SMS Verification Infrastructure Is Evolving in Modern Digital Platforms

As digital platforms scale globally, identity verification has become a critical layer of modern tech infrastructure. From fintech startups to social apps and enterprise SaaS tools, ensuring that users are real, unique, and secure is now a baseline requirement rather than an optional feature....

The Business of Recycling: Profit, Waste, and Sustainability

The business of recycling stands at the intersection of environmental responsibility and economic opportunity....

Serhii Tokarev Spoke About The Third Season Of The Generation H Accelerator

Serhii Tokarev spoke about the Generation H 3.0 HealthTech accelerator, which is opening applications...

Borade AI Founder Shiv Kumar Borade on Building an AI Growth Engine for Small Businesses

Speaking with TechGraph, Shiv Kumar Borade, Founder & CMD of Borade.AI, discussed how many...

When AI-Generated Documentation Hurts More Than Helps

AI-generated documentation has quickly become a selling point for modern SaaS and developer platforms,...

From Black Box to Trusted AI: Why Defence Needs Constitutional AI Models

For decades, the defence and intelligence agencies have followed one non-negotiable rule: trust nothing...

Apple Reports $111.18 Billion Revenue in Q2 FY26, Net Profit Rises to $29.6 Bn

Apple Inc. (NASDAQ:APPL) has reported its financial results for the quarter ended March 28,...

MochaTrade Raises Pre-Seed Funding From Y Combinator and Pioneer Fund

MochaTrade, a global trading platform focused on offering perpetual futures linked to U.S. stocks, commodities, and indices, has raised an undisclosed pre-seed funding round...

Hermès vs MetaBirkin: The NFT Case That Redefined Ownership on Ethereum

The NFT boom of 2021 and early 2022 pushed digital assets into the mainstream,...

Why Ontarex.com Is Gaining Canadian Investor Attention

In recent months, Ontarex has started to attract noticeable attention from Canadian investors. As...

Cisco Report: Cybersecurity Remains Top Challenge as Industrial AI Adoption Expands

Cisco Systems (NASDAQ:CSCO) has released its latest State of Industrial AI Report, highlighting how...

Gen Z Shops Differently: How E-commerce Backend Systems Are Adapting to ‘Always-On’ Buying

Gen Z’s influence is not limited to new preferences for purchases. It has redefined...

Reframing AR for Consumers: Luxid Tech’s Siddhant Agarwal on Building Screen-First Smart Glasses for Everyday Use

Speaking with TechGraph, Siddhant Agarwal, Founder of Luxid Tech, discussed how the AR and VR industry has remained constrained by over-engineered products focused on...

How Tech-Driven Hiring Models Are Closing India’s Employability Gap

The paradox of employment in India becomes increasingly pronounced every year, as many students graduate from college but struggle to meet the needs of their respective companies. It is not an issue of educational standards anymore, but relevance. In an era where artificial intelligence...

Bihar Police, Vehant Technologies Partners to Deploy Screening Systems Across 40 Courts

In a bid to enhance safety and security across court premises for judges, lawyers,...

Rethinking Hospital Security: TrioTree Technologies CEO Surjeet Thakur on Securing Fragmented Hospital IT Environments

In an interaction with TechGraph, Surjeet Thakur, Founder and CEO of TrioTree Technologies, outlined...

The IoT Platform Market Just Consolidated: Smart Integrators Are Looking Elsewhere

Three platforms changed owners in 15 months. Your stack didn't change. Your risk profile did.

How Home-Based Healthcare is Improving Medical Accessibility Across India

The Indian health care industry has seen considerable transformation in recent times, primarily due...

Meta Platforms, Broadcom Partners to Co-Develop Multi-Gen Silicon AI Chips

Facebook parent Meta Platforms (NASDAQ: META) has expanded its partnership with Broadcom to co-develop...

Practo Names Srijesh Kumar as Global CPTO

India-based online doctor consulting platform, Practo has announced the appointment of Srijesh Kumar as...

India’s Foreign Secretary Vikram Misri Holds Talks with FBI Chief Kash Patel

India’s Foreign Secretary Vikram Misri met FBI Chief Kash Patel in Washington on Thursday...

Cisco Appoints Pete Shimer to Board, Daniel Schulman to Step Down

Cisco Systems (NASDAQ:CSCO) has appointed Pete A. Shimer to its board of directors, while...

8B, PayU Partner to Enable UPI Payments for Indian Users Across Central Asia

Central Asian fintech infrastructure company 8B has partnered with PayU Payments to enable UPI...

Cisco Report: Cybersecurity Remains Top Challenge as Industrial AI Adoption Expands

Cisco Systems (NASDAQ:CSCO) has released its latest State of Industrial AI Report, highlighting how...

“Budget should focus on reducing taxes on capital gains,” Says Abhishek Gupta of Hex N Bit

Speaking in the upcoming Union Budget 2021, Abhishek Gupta, Founder, and CEO, Hex N...

“China is a Global thief” Rep. Tom Rice on Uyghur Forced Labor Prevention Act

Speaking at the House on Uyghur Forced Labor Prevention Act, Rep. Tom Rice (R-SC)...

Ethnic Wear Brand Alaya By Stage3 Raises Seed Funding Led by LC Nueva AIF

Gurugram-based Alaya By Stage3, a modern Indian wear brand operated by Cosmo Brands, has...

Refurbished Electronics Platform Grest Secures FDI from Japan’s ICMG in Pre-Series A Round

Grest, an India-based premium refurbished electronics platform, has secured foreign direct investment from ICMG...

Gen Z Shops Differently: How E-commerce Backend Systems Are Adapting to ‘Always-On’ Buying

Gen Z’s influence is not limited to new preferences for purchases. It has redefined...

Alphabet Discloses $2.14 Billion in Public Equity Holdings as of June 30

Alphabet Inc. disclosed $2.14 billion in equity securities held across 39 positions as of...

Gaming for Good: Boosting the Indian Gaming Community through Technology

The Indian gaming industry is transforming remarkably, driven by technological advancement and a growing...

India to generate $100 bn from telephonic investments

India expects to attract $100 billion in investments in the telecom sector, a union...