Zero Trust - What Is It and Why It Matters

Zero Trust - What Is It and Why It Matters

Cybercrime, phishing attempts, and security hacks are all?on the rise?worldwide. These data breaches can be?costly?to businesses and individuals. They leech your valuable time, energy, and information, as well as revenue and finances. Over the next five years, the cost of cybercrime is expected to rise by 15% per year. If trends continue as expected, this will lead to a?$10.5 trillion?cost annually by 2025.?

Enter zero trust cybersecurity. Zero trust is an attempt to meet the moment globally. Zero trust methodology aims to address both the constantly evolving methods of cybercriminals, as well as the shifting needs of businesses, governments, and consumers.?

What is Zero Trust Cybersecurity?

Zero trust is like a zero-tolerance policy, in that it assumes risk can come from anywhere, at any time. Most traditional security models grant lasting trust to users logging in from recognized networks, locations, or IP addresses. The zero-trust model, however, assumes there is no?network edge, and therefore there can be no lasting reliability.?

Instead, zero trust requires that all users, whether inside or outside an organization’s network, have their credentials be constantly checked, authenticated, and validated. This continual reauthorization is necessary before accessing or downloading any files, applications, or data within the protected network.??

Origins of Zero Trust

Zero trust was invented by?John Kindervag, widely considered one of the world’s foremost cybersecurity experts. Kindervag is currently Field CTO with Palo Alto Networks after years at Forrester Research. The creation of the zero-trust model is attributed to his field work as a cybercrime analyst. It has since been adopted by Google, Coca Cola, many airlines, and more.?

Notably, the zero-trust model has also been recommended by the US House of Representatives. After the disastrous?OPM data breach, the House issued an official recommendation that all government agencies adopt the zero-trust model?

Example of a Zero Trust System

To understand how zero trust works, Google has compared the model to?going to the airport. Traditionally, at the airport, you must present your identification and ticket to security before accessing the gates. This would be the equivalent of sharing your IP address (like a passport, to prove who you are), as well as your authorized destination (your ticket, showing where you plan to go). In a zero-trust model, every time you log in, you must show these credentials and have them be authenticated. Similarly, every time you fly, you have to present the same proofs, even if you have flown from that airport, and to the same destination, before. This re-authentication is what sets zero trust apart from traditional network security, which assumes that users who have logged in (or checked in) once before can continue to be trusted.??

Additionally, gate access is restricted in the zero-trust model, under this airport metaphor. Gone would be the option to wander freely from gate to gate, once you have presented your credentials once at security. Instead, even authorized users can only access the specific applications and destinations that they requested upon entry. This extra step limits the amount of damage that an impersonator would be able to do, assuming that they were able to evade detection at the initial checkpoint.?

Differences Between Zero Trust and VPN Networks

Both VPNs and zero trust can be deployed to enable remote users to access confidential materials. This makes both systems especially helpful as more companies continue to ask employees to work from home. Both VPNs and zero trust models are attempts to manage the increased risk from having so many different remote access points.?

However,?VPNs and zero trust security?manage this risk in different ways. A VPN creates a remote perimeter. It grants access to all authorized users and managed devices who log in through the VPN. Zero trust, by contrast, automatically restricts access to all users, assuming there is no trusted network.?

While zero trust is a newer concept in cybersecurity, and thus less proven than VPN technology, it is an attempt to restrict the amount of damage that a hacker can do, once they have gained access to the trusted network created by the VPN.?

Benefits of Zero Trust

Zero trust upends the traditional perimeter security model by restructuring the framework of risk. Some benefits include:

1.?????Portability – The zero-trust model can be accessed by users all over the globe. Gone are the physical limitations of needing a dedicated office space and company network.

2.???Flexibility – A zero trust model has less initial set up for users than requesting access to a VPN, minimizing onboarding time.?

3.???Security – Zero trust is designed to mitigate the risks of network perimeters, or the “blast radius” if a breach does occur.?

4.???Invisibility – Despite the multiple authentications necessary, zero trust should be seamless for users. They should be able to sign in and use a strong second factor in order to conduct business as usual.?


Evolution of Zero Trust Security?

As more businesses and users utilize?hybrid cloud technology?to store data, zero trust is a necessary evolution within the cybersecurity landscape to help mitigate the associated increased risk. When done correctly, zero trust lives up to its motto of “never trust, always verify” and can create a stronger, safer online experience for companies, governments, and individuals.



https://news.networktigers.com/opinion/zero-trust-what-it-is-and-why-it-matters/

要查看或添加评论,请登录

Michael Savarese的更多文章

  • File Server - What Is It And How Does It Work?

    File Server - What Is It And How Does It Work?

    With most business and communications conducted online, file servers have become increasingly important, especially for…

  • Should Your Company Invest In Dark Web Monitoring?

    Should Your Company Invest In Dark Web Monitoring?

    As hacks, ransomware attacks and data breaches occur with increasing frequency, many companies are enlisting third…

  • Is Your Business Safe From An Advanced Persistent Threat Attack

    Is Your Business Safe From An Advanced Persistent Threat Attack

    Cyberattacks including advanced persistent threat attacks (APTs) are becoming increasingly common. These attacks happen…

  • Migrating To A Cloud Managed Network

    Migrating To A Cloud Managed Network

    For businesses to succeed in 2021 and beyond, agility and responsiveness are critical. Data is the new currency, and…

  • Common Network Security Monitoring Tools

    Common Network Security Monitoring Tools

    Network security monitoring tools help protect digital assets, including network traffic, while also preventing and…

  • Healthcare Company Hacks On The Rise

    Healthcare Company Hacks On The Rise

    Over the past year, healthcare company hacks have been on the rise. On a weekly basis, large companies, major…

  • My Business Network Was Hacked - The Consequences

    My Business Network Was Hacked - The Consequences

    You drive to work after a long weekend, walk to your workspace and open your system to hundreds of spam notifications…

  • What Is End Point Security

    What Is End Point Security

    “Endpoint security” is a term that is commonly used when cyber and network security is discussed. However, many do not…

  • What Is Cybersecurity And Why Does It Matter

    What Is Cybersecurity And Why Does It Matter

    A good cybersecurity strategy can offer strong security against attacks designed to access, change, destroy, or delete…

  • 10 Cybersecurity Breaches You Should Worry About

    10 Cybersecurity Breaches You Should Worry About

    Protecting business data is a growing challenge because cyber threats are getting more intense and sophisticated amid…

社区洞察

其他会员也浏览了