Reaping the Benefits of Zero Trust

Date:

Trending

The advent of emerging technologies such as robotic process automation, artificial intelligence, and blockchain, as well as heightened security concerns due to the pandemic, bring new cybersecurity risks and challenges.

- Advertisement -

This evolving technology landscape has made it even more imperative for organizations to better manage cybersecurity risks and become security resilient, and many are turning to a Zero Trust approach to do this.

What is Zero Trust?

- Advertisement -

According to the National Institute of Standards and Technology (NIST), Zero Trust (ZT) refers to an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources.

A Zero Trust architecture (ZTA) uses Zero Trust principles to plan industrial and enterprise infrastructure and workflows. Zero Trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership.

Zero Trust is not a tool or a new technology, but a strategic architectural concept, and should be aligned with business objectives.

Why does Zero Trust matter to an organization?

The primary goal of a solid Zero Trust strategy is to extend the control plane from the internal secure assets of the environment as far outward as possible. ZTA is all about “verify, and then trust.”

The COVID-19 pandemic has resulted in many organizations shifting to remote working due to the safety risk and government guidelines, like city lockdowns.

As a result, it has impacted nearly every organization’s cybersecurity strategy. This obviously has posed an external issue for cybersecurity leaders on how they could trust personal devices and home networks to be secured in line with the organization’s security policies and procedures.

In many cases, it has become necessary for cybersecurity leaders to consider implementing controls without trusting the resources in the interest of maintaining business continuity. However, many organizations are now reassessing these practices and transitioning where possible to a Zero Trust approach.

Implementing Zero Trust

The newly released ISO / IEC 27002:2022 Information security, cybersecurity and privacy protection – Information security controls standard provides guidance on implementing Zero Trust principles that organizations can consider, such as:

• Assuming the organization’s information systems are already breached and thus not reliant on network perimeter security alone.

• Employing a “never trust and always verify” approach for access to information systems.

• Ensuring that requests to information systems are encrypted end-to-end.

• Verifying each request to an information system as if it originated from an open, external network, even if these requests originated internally to the organization.

• Using “least privilege” and dynamic access control techniques. (e.g., authentication information, user identities, data about the user endpoint device, and data classification).

• Always authenticating requesters and always validating authorization requests to information systems based on information (e.g., enforcing strong multi-factor authentication).

Why are boardrooms supporting Identity and Zero-Trust initiatives?

Like any security initiative, Zero Trust requires commitment from the board. Zero Trust should involve the board, the chief information security officer, and other leaders to determine priorities and ensure that they will be effectively implemented across the organization.

In general, boardrooms tend to trust insiders, that is, authorized users, rather than outsiders. However, Zero Trust begins with not differentiating insiders and outsiders. An organization’s existing controls may not suffice to address new cybersecurity risks and it may need to implement additional and/or new controls.

Zero Trust is built on the premise that trust cannot be granted forever and needs to be evaluated on a continual basis. Today, many boardrooms are already driving the change and supporting identity and ZT.

Many boardrooms are convinced of the value of ZT after realizing these business benefits:

• Reduction in overall cost and expenditures.

• Reduction in the scope of requirements for compliance related to cybersecurity, as it entails accurately mapping assets, inventories, and data, which decreases the risk of unauthorized access.

• Greater control in the cloud environment through authorized workloads.

• Lower breach potential through verified and approved communications.

• Lower compliance risk.

• Business agility and speed.

• More streamlined user experience, allowing users to be less encumbered by security as part of their daily job.

Summary

In summary, achieving Zero Trust does not require the adoption of any new technologies. It’s simply a new approach to cybersecurity to “never trust, always verify,” or to eliminate any and all trust, as opposed to the more traditional perimeter-based security approach that assumes user identities have not been compromised, and all human actors are responsible and can be trusted.

Zero Trust does not eliminate trust completely but uses technologies to enforce the principle that no user and no resource has access until it has been proven it can and should be trusted—and in the process, strengthen cybersecurity defenses.

THE SNAPSHOTS

Sign up to get quick snaps of everyday happening, directly in your inbox.

We don’t spam! Read our privacy policy for more info.

- Advertisement -

Support our independent journalism PayPal (Outside India) For PayU (For Indian Readers).

Chetan Anand
Chetan Anand
Chetan Anand is Associate Vice President of Information Security and CISO at Profinch Solutions.

More Latest Stories

More Articles

00:01:49

Trump Claims U.S. Trade Threat Helped Defuse India-Pakistan Ceasefire

On Monday, U.S. President Donald Trump said his administration played a key role in easing tensions between India and Pakistan by making future trade...

Operation Sindoor: India, Pakistan Agree to Ceasefire After High-Level Military Talks

India and Pakistan agreed on Saturday to halt all military activities across land, air, and sea, marking a significant pause in rising tensions over recent weeks. The decision came after a direct call between the Director Generals of Military Operations (DGMOs) earlier in the...

India Says Pakistan Attempted Large-Scale Drone Incursions, Used Civilian Flights as Cover

India on Friday accused Pakistan of attempting large-scale drone incursions across the western border...

The Future of B2B Commerce: E-commerce Platforms and Beyond

The way companies buy items and sell services has changed a lot from the...

Why Crypto Traders Are Flocking to Cap-tex Now

A recent surge in cryptocurrency prices, driven by global economic shifts and high-profile endorsements,...

How AI-Powered Online Platforms Are Revolutionizing Life Insurance Recommendations

Anyone with a child, a spouse, a life partner, or a parent as a...

From Arcade to Adventure – The Evolving Face of Entertainment and Why It Counts

Entertainment has always been a reflection of the shifting expectations of society. Earlier, people...

How Technology Helps Combat Various Viruses and Diseases

Technology has transformed the ways we approach vaccines, particularly for the flu. One noteworthy...

No OTPs, No Hassles: The Rise of Passwordless Digital Payments

India is pacing toward a passwordless future in the digital payments ecosystem. Technologically, it’s a big win, with faster checkouts, seamless user experiences, and...

12 Eye-Popping Hacks to Make Your Next Business Presentation Sparkle

Business presentations are often necessary to gain new clients and showcase what it is...

The Long-Term Power of Investing: Selecting Undervalued Industries

Investing can seem overwhelming, especially for beginners, as the numerous options and strategies available...

How a Money Back Policy Can Be a Smart Financial Choice?

Creating financial security involves strategic planning because investment decisions form one of the essential...

Meta Legal Head Offloads Shares worth $577K

Meta Platforms Inc.’s (NASDAQ: META) Chief Legal Officer, Jennifer Newstead, has sold 921 shares,...

Shell Executive Robin Mooldijk Sells €1.69 Mn in Shares

Shell plc’s Projects & Technology Director, Robin Mooldijk, has offloaded 50,000 shares in the company, amounting to approximately €1.69 million. According to the filing, the...

HR Chief Amy Coleman Reports Over 46,000 Microsoft Shares in SEC Filing

Microsoft (NASDAQ: MSFT) Chief Human Resources Officer, Amy Coleman, has reported her stock holdings in a recent regulatory filing with the U.S. Securities and Exchange Commission (SEC). According to the Form 3 filing, "Coleman owns 46,023 shares of Microsoft common stock, along with 18,100 restricted...

BGC Group raises $700 Mn in bond sale to refinance debt

BGC Group, Inc. (NASDAQ: BGC) has finalized a $700 million private offering of senior...

Alphabet Legal Chief John Kent Walker to Sell $2Mn in Shares via Morgan Stanley

Alphabet Inc.’s (NASDAQ: GOOGL) Chief Legal Officer, John Kent Walker Jr., has filed to...
00:02:53

Canada, Australia Partner to Build $6 Bn Arctic Radar System

In a bid to enhance Arctic and national security, Canada's Prime Minister Mark Carney...

Meta Chief Legal Officer Jennifer Newstead Offloads Shares as Part of Trading Plan

According to regulatory filings, Jennifer Newstead, Chief Legal Officer at Meta Platforms, Inc. (NASDAQ:...

Nvidia Director Aarti Shah to Sell Shares Worth $2.37 Mn

Aarti S. Shah, a director at NVIDIA Corporation (NASDAQ: NVDA), has filed a notice...

Alphabet Board Member Frances Arnold Increases Stake Following Dividend Allocation

According to a recent regulatory filing, Frances Arnold, a board member at Alphabet Inc.,...

Layer PR Wins SME News UK Awards, Expands to Bengaluru

Layer PR, a global public relations firm owned by TechGraph, has secured two major...

Google Acquires Wiz for $32 Billion in All-Cash Deal

Google LLC, a subsidiary of Alphabet Inc. (NASDAQ: GOOG, GOOGL) has signed a deal...

The Future of Digital Payments and Cybersecurity Challenges

The future of digital payments is evolving rapidly, driven by technological advancements, changes in...

How a Money Back Policy Can Be a Smart Financial Choice?

Creating financial security involves strategic planning because investment decisions form one of the essential...

The Ultimate Guide to Choosing and Using Fonts in Your Design Projects

Fonts play a crucial role in every design project, from branding and web design...

Predictive Analytics: The Key to Supply Chain Resilience

In today’s interconnected global economy, supply chains are the lifeblood of businesses, weaving intricate...

Software and Technology Changing the Industry

The advent of software and technological advancements has been a game-changer across various industries....

Jensen Huang Offloads $49.8Mn in Nvidia Shares

Nvidia (NASDAQ: NVDA) CEO and President Jen-Hsun Huang has disclosed the sale of 431,611...

Meta Legal Head Offloads Shares worth $577K

Meta Platforms Inc.’s (NASDAQ: META) Chief Legal Officer, Jennifer Newstead, has sold 921 shares,...

Google Acquires Wiz for $32 Billion in All-Cash Deal

Google LLC, a subsidiary of Alphabet Inc. (NASDAQ: GOOG, GOOGL) has signed a deal...

The Sustainability Imperative: How IT Distribution Is Driving Green Tech Adoption

In today's day and time sustainability is no longer just a corporate commitment, it...

The Future of Digital Payments and Cybersecurity Challenges

The future of digital payments is evolving rapidly, driven by technological advancements, changes in...