7

Why zero trust is critical in the modern hybrid workplace

 2 years ago
source link: https://itwire.com/guest-articles/guest-opinion/why-zero-trust-is-critical-in-the-modern-hybrid-workplace.html
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

Friday, 17 December 2021 00:23

Why zero trust is critical in the modern hybrid workplace

By Sash Vasilevski, principal at Security Centric

Sash Vasilevski, Principal at Security Centric

GUEST OPINION: The widespread introduction of hybrid working has changed the rules of the game when it comes to IT security.

Rather than relying solely on perimeter defences, organisations now need to find other ways to protect users and assets regardless of their location. Those assets could be on-premise, on a cloud platform, or at a user’s home.

One approach gaining increasing attention is zero trust. It’s a strategy that is built on a range of underlying security principles including defence in depth, the separation of authentication and authorisation, least privilege, and network segmentation.

What zero trust is not is a security silver bullet. There are numerous tools on the market that claim to deliver it but, in reality, the strategy requires a number of steps and a variety of different components.

Some clear guidance on what is required has been provided by both the US-based National Institute of Standards and Technology (NIST) and the Australian Cyber Security Centre (ACSC). According to NIST, the key requirements for zero trust are:

1. Treat all data and systems as resources:
Controls must be applied to anything within an IT infrastructure that is a resource. This includes everything from a Word file on a server through to a complex application running on a cloud platform.

2. Secure all communication:
All data traffic between devices, applications, and databases needs to be secured. Encryption is an effective way to achieve this, and it should also be extended to protecting data at rest. This approach can also provide solid protection against ransomware attacks.

3. Grant access to resources on a per-session basis:
Security can be further enhanced if there is no persistence of access. In practice, this means that users and applications need to be authorised each and every time they seek access to a resource. Just because someone has logged on once, this should not mean they have ongoing access.

4. Implement dynamic authorisation:
In a zero-trust environment it’s important to rely on more factors than simply log-in credentials. Other variables should be added to the mix including geographic location, the device being used, and the historical activity of the party requesting access. Part of this process will involve examining behavioural characteristics to determine that a user or resource is actually who or what they claim to be.

5. Monitor and measure the posture of assets:
Resources and activity on a network should be monitored to determine what constitutes normal operating conditions. Once this has been confirmed, security teams can then respond when activities occur that fall outside those parameters which could be security incident indicators.

6. Make authentication and authorisation dynamic:
It’s important to avoid keeping authentication and authorisation in place for extended periods. Users and applications should be required to constantly prove their identity before being granted access to the resources or services they are requesting.

7. Collect as much information as possible on current assets:
A lot of information can be collected from enterprise IT systems, but unfortunately much of it is not acted upon. An example could be workflows that are bypassing security policies or intent. Such activity should be flagged for closer inspection to determine whether it is authorised or being conducted by a malicious party.

Rather than being achieved through the deployment of a single software tool or process, true zero trust requires the introduction of a portfolio of components and activities to be truly effective. It’s important to understand exactly what exists within your infrastructure, what risks are being faced, and exactly what needs to be done to overcome them.

Thankfully, most organisations will already have in place many of the resources required to achieve a zero trust strategy and so won’t need to start from scratch. It’s a matter of building on existing security measures and extending them to cover all resources within their information environment – be that on-premise, cloud or a combination.

Flexible and hybrid work practices are likely to remain a feature of life in coming years. Taking the steps necessary to achieve true zero trust will be well worth the effort.

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK