Putting a Value on Trust — Introducing Zero Trust Security Approaches

Putting a Value on Trust — Introducing Zero Trust Security Approaches

With so many high-profile hacks this year, it's easy to want to throw up your hands and say, "Is there nothing that can be trusted?!" Interestingly, that lament is what is driving the latest approach to cybersecurity -- zero trust. Zero trust is what it sounds like, a security approach centered on the belief that organizations should not automatically trust anything accessing their systems either inside or outside their perimeters. Instead, all people and devices must be verified before access is granted. To the untrained eye, this seems untenable. How, in this day and age, when we depend on digital information and connection to do most anything, can we use a process where we have to constantly verify identity and access permissions? Luckily, the practice of zero trust is more sophisticated than its premise.

Remote work due to the pandemic pushed many organizations to implement zero trust practices sooner than planned. A zero trust approach allows employee credentials to be securely used from multiple devices, not just agency issued ones. This allows individuals to log in and do work from any location regardless of if they have the "approved" equipment.

To do this, zero trust involves adopting very granular...Finish reading on GovEvents Blog ??

要查看或添加评论,请登录

Kerry Simon Rea的更多文章

  • Coordination is Key to CDO Success

    Coordination is Key to CDO Success

    Chief Data Officers (CDOs) are one of the newer positions in government, but their role is quickly becoming one of the…

  • Realizing the Value of Healthcare Data

    Realizing the Value of Healthcare Data

    As we’ve learned over the past year and a half, data is a critical tool in keeping us healthy as individuals and as a…

  • Agility. Enabled by Agile.

    Agility. Enabled by Agile.

    Agility has been a key attribute for success over the past year and a half. Everyone had to quickly adapt in their…

  • As Doors Open…Citizens Still Want to Meet Online

    As Doors Open…Citizens Still Want to Meet Online

    As we emerge from the isolation of the pandemic and begin interacting in person again, it will be in a world that looks…

  • Formalizing the Use of the Internet of Things

    Formalizing the Use of the Internet of Things

    The Internet of Things (IoT) is powering how governments serve citizens. Sensors deployed in streetlights, traffic…

  • Blockchain: Technology for Joining Security and Visibility

    Blockchain: Technology for Joining Security and Visibility

    Blockchain, a technology that facilitates the process of recording transactions and tracking assets in a business…

  • Government Security: Looking From the Inside Out

    Government Security: Looking From the Inside Out

    With a number of high-profile security hacks involving widely used software, government agencies are retraining their…

  • A Short History of Shared Services…and What’s Next.

    A Short History of Shared Services…and What’s Next.

    Shared Services in government is nothing new. The idea began in the 1980s with the consolidation of payroll and some…

  • The Growing Impact of IoT

    The Growing Impact of IoT

    The use of Internet of Things (IoT) to manage infrastructure and services is not a new concept, but response to the new…

  • FirstNet Serves Those First on the Scene

    FirstNet Serves Those First on the Scene

    FirstNet is a nationwide wireless broadband network for first responders being built and deployed through a first of…

社区洞察

其他会员也浏览了