Quantcast
Channel: Finance Archives | The Kickass Entrepreneur
Viewing all articles
Browse latest Browse all 142

Zero Trust: Principles and Simple Steps for Implementation

$
0
0

As more businesses move to the cloud, the manner in which they protect data evolves. In a typical on-premises network design, businesses may follow the “trust but verify” principle. However, protecting cloud data requires the “never trust, always verify” strategy. Understanding zero-trust architectures and how to apply them can help improve security.

What Exactly Is Zero Trust Security?

Zero trust is a security model that requires tight verification for any user or device attempting to access a network’s assets. Zero trust security aims to keep the network safe from within. To do this, all entities are deemed suspect, regardless of whether the person or device has already been validated.

The IT world has evolved tremendously over the last two decades, with today’s multi-cloud and hybrid-cloud settings being particularly sophisticated. Networks are no longer limited to a discrete perimeter with established limits.

Today’s networks are widespread, complicated, location-independent, and occasionally vendor-independent. On the one hand, cloud environments enable users to access network assets from any device and location. On the other hand, the network no longer has clear limits to defend, and cyber criminals exploit this vulnerability, tricking people and systems into granting unauthorized access.

Organizations can use zero trust security to secure their IT assets. By not extending implicit trust to anyone with network access, the organization can avoid insider threats—including deliberate threats and negligent or accidental damage—from putting the network and its assets at risk.

There is no single zero-trust technology. Rather, it is a notion executed using various technologies in a flexible architecture centered on an organization’s protected assets.

What Are the Basic Principles Underlying Zero Trust?

Zero Trust means exactly what it says. Never put your trust in anyone. The fundamental elements of a Zero Trust enterprise cybersecurity architecture are:

Re-evaluate Default Controls for Access

A zero trust approach implies risks exist both inside and outside the network. This is why no one with network access should be trusted. Each request to enter the network must be strictly authenticated, appropriately authorized, and encrypted.

Use Multiple Protective Measures

Here are some precautionary steps every zero-trust model should use:

  • Identity security and device discovery: This can help maintain track of which credentials are present on which devices, monitor the network ecology, and build a baseline of normal behavior. This information can be used to set up identity challenges and monitor for potential threats.
  • Multi-factor authentication (MFA)—Multiple pieces of evidence can help authenticate the user’s identity. This usually entails requesting users to validate through security questions, logic-based exercises, or email or SMS confirmation. MFA can help prevent a user with only one piece of gathered information from accessing the network.

Establishing preventative security is intended to stop breaches and limit damage. In addition to the above techniques, organizations should implement encryption, email security, and cloud access security brokers.

Use Real-Time Monitoring

In addition to establishing preventative measures, a zero-trust model should have real-time monitoring capabilities to respond to emerging risks. This technology can assist organizations in promptly detecting, investigating, and resolving breaches, ideally before intruders can spread laterally across the network.

Organizations should implement real-time identity challenges instead of passively logging and forwarding events to a security information and event management (SIEM) solution. Identifying suspect authentication events in real time can aid in the detection of brute force attacks and credential spoofing and the timely prevention of attacks.

Align to Broader Security Strategies

A zero-trust architecture does not substitute for other forms of security. It covers certain areas of security but not all. This is why a zero-trust model should be part of a comprehensive security plan that includes technologies such as endpoint protection, detection and response, real-time monitoring, and more.

Five Steps for Implementing Zero Trust

Here’s how to implement zero trust security:

Transition from Threat to Protect Surface

The old concept of a threat surface is losing relevance in today’s IT systems. Because environments are dynamic and comprise numerous components beyond an organization’s control, addressing the entire threat surface is impossible. Instead, focus on the “protect surface”—the most crucial assets your organization must defend:

  • Mission-critical applications
  • Software services required for business operations
  • Other valuable assets
  • Business-critical, private, or sensitive data

Map Transaction Flows

Determine how traffic flows over your network and other connected networks. Define the Internet flows necessary for company operations and safeguard them while blocking or mitigating other flows.

Architect a Zero Trust Network

There is no broad model for a zero-trust network (ZTN). Your ZTN must be based on your protected surface and established transaction flows. Implement a technique to enforce micro-segmentation and utilize it to establish a micro-perimeter around important assets, enforce access control, and enable monitoring across all communication layers (from the network to the application layer).

Make a Zero Trust Policy

Define your zero-trust policies after implementing a ZTN. Use the 5 W’s method to ensure that a policy answers every possible query about network traffic—who is allowed to access resources, via what application when they should be allowed to access it, where the assets are located or addressed, and why or for what purpose they need to access it and how (such as which data or features they require).

Observe and Maintain the Network

Monitor logs continuously to identify traffic irregularities at the network and application levels. This will provide valuable knowledge for evolving the network and its policies.

Implement these five actions on your most essential assets first, then gradually spread them to other assets and networks to increase zero trust protection.

Conclusion

To summarize, as businesses migrate to cloud-based solutions, the need for comprehensive data protection has never been greater. Zero Trust Security is a paradigm shift from the previous “trust but verify” strategy to the more severe “never trust, always verify” mindset, which is critical for protecting against emerging cyber threats. Zero Trust Architecture protects networks from internal and external threats by treating every user and device as potentially untrustworthy.

Furthermore, adhering to these principles and following a systematic five-step implementation approach may strengthen their defenses, protect important assets, and react confidently and resiliently to the ever-changing digital landscape.

The post Zero Trust: Principles and Simple Steps for Implementation appeared first on thekickassentrepreneur.com


Viewing all articles
Browse latest Browse all 142

Trending Articles