Zero Trust - The New Standard Of Security

The traditional approach to computer security has long been based on perimeter defences being designed based on threat intelligence about the most likely attackers targeting a network or organization. 

These approaches have begun to struggle when faced with new types of attacks and evolutions in the threat landscape. Perimeter-based defences, such as firewalls or signature-based antivirus software are no longer sufficient to protect networks.

A Zero Trust security system is an approach to the design and implementation of information security systems that assume every user, device or application accessing an IT system is untrusted and must be treated with the same level of scrutiny. 

How can organisations adopt Zero Trust security principles?

Rolling out Zero Trust across an entire organisation requires control over identities, devices, applications, data, infrastructure and networks. Zero Trust is not a single product or appliance to buy, but an ideology of security. It involves pulling the traditional perimeter back and combining traditional network access controls with user behaviour analytics (UBA) and micro-segmentation.

If you are planning on adopting Zero Trust initiatives in your organization, this is what you need to take into account:

Identities:    Strong identities are a fundamental part of Zero Trust, and they’re critical for establishing trust and access within the environment. Strong identities are also important for supporting a Zero Trust framework because they are the basis of verifying users before accessing systems. One method of enabling strong identity is to leverage multi-factor authentication methods such as two-factor (2FA) or mobile authentication.

Multifactoral Authentification:    Multifactor or continuous authentication is not a single approach, but several methods that can be deployed together to add levels of trust on top of an identity framework. The three basic approaches to authentication are:

  • Single-factor authentication (SFA): This is based on something you know, such as a user ID and password or PIN. It’s the most common authentication method used today
  • Multi-factor authentication (MFA): This is based on something you have, such as a security token, smart card or mobile device. MFA can be combined with SFA.
  • Continuous Authentication (CFA): This is a method of confirming identity in real-time. It's accurate, convenient and prevents attacks that have been successful in the past because it doesn’t rely on static data. 

MFA and CFA are recommended levels of security within a Zero Trust framework.

Passwordless Authentication:   We recommend methods of passwordless authentication to our clients such as the YubiKey. The Yubikey is a hardware-based device that replaces passwords. It’s a durable, inexpensive and convenient method of strong authentication that can also be used as a USB HID device or NFC.

Network Segmentation:    Network segmentation and the ability to implement network controls allow for traffic policy to be implemented for each department and application. By taking advantage of micro-segmentation, a network can introduce finer levels of granular controls within the firewall or perimeter to limit access, protect against denial-of-service attacks, etc. NetSeg is a framework that enables this type of authentication framework in open source systems.

Secure ALL devices on your network:   Allowing unaudited and unpatched devices onto your network has the potential to cause a lot of damage. In the past, it was fairly easy to block all devices that weren’t part of your network policies, but today’s world involves BYOD (Bring Your Own Device) and other scenarios where users and vendors connect new or unapproved devices to the network regularly. View every user device as a potential threat and limit access to sensitive resources.

Be specific with user roles and access:   Security control should become an integral part of organisational policy. Roles and access should be as granular as possible, with clear definitions for each role. For a good example of this framework in action, take a look at AWS’s Identity and Access Management (IAM) framework. It has become one of the best examples of an effective identity framework thanks to its clear separation between roles and privileges.

If you do plan on adopting Zero Trust initiatives in your organization then bear in mind the following advice: A Zero Trust framework isn't something that can be implemented overnight. Ensure you start in a test or development environment, and once the Zero Trust model has been successfully established, aim to implement it to your entire digital architecture.

Charles Griffiths is  Head of IT and Operations at AAG-IT.com                            Image: Unsplash

You Might Also Read: 

The Costs Of A Data Breach:

 

« Securing Hybrid Workplaces From Attack
Russian Trolls Target News Websites »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Talend

Talend

Talend is a leader in cloud and big data integration software. Applications include Risk and Compliance management.

Redcentric

Redcentric

Redcentric is a leading UK IT managed services provider. We deliver managed IT, cloud computing, data backup, information security services and managed networks.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

SecLytics

SecLytics

SecLytics is the leader in Predictive Threat Intelligence. Our SaaS-based Augur platform leverages behavioral profiling and machine learning to hunt down cyber criminals.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

National Cyber Security Centre (NCSC) - Ireland

National Cyber Security Centre (NCSC) - Ireland

The National Cyber Security Centre (NCSC) is the operational side of the Department of Communications in regard to network and information security in the Republic of Ireland.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Keeper Security

Keeper Security

Keeper is a leading enterprise password manager and cybersecurity platform for preventing password-related data breaches and cyberthreats.

3wSecurity

3wSecurity

3wSecurity provides visibility to your company’s internet facing systems throughout the security life cycle, allowing for a more thorough approach to vulnerability management.

GateKeeper Enterprise

GateKeeper Enterprise

The GateKeeper Enterprise software is an identity access management solution. Automated proximity-based authentication into computers and websites. Passwordless login and auto-lock PCs.

Nigerian Communications Commission (NCC)

Nigerian Communications Commission (NCC)

NCC has established a CSIRT for the telecommunication industry to provide services and support for the prevention and management of potential cyber security related emergencies.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Togggle

Togggle

Togggle offers seamless identity verification solutions and distributed infrastructure, enabling organizations to combat fraud and ensure compliance with data protection regulations.

L&T Technology Services (LTTS)

L&T Technology Services (LTTS)

L&T Technology Services Limited (LTTS) is a global leader in Engineering and R&D (ER&D) services.

Hubble

Hubble

Hubble grew from the idea that legacy solutions were failing to provide organizations with the asset visibility they needed to effectively secure and operate their businesses.