Zero Trust The Future of Network Security , Modal , Works & Component? Like& Subscribed our channel?

แชร์
ฝัง
  • เผยแพร่เมื่อ 5 ก.ย. 2024
  • #cybersecurity #india #informationtechnology #cybersecurity #informationtechnology #itnetworking #technology
    What is Zero Trust?
    Zero Trust is a network security strategy based on the philosophy that no person or device inside or outside of an organization’s network should be granted access to connect to IT systems or workloads unless it is explicitly deemed necessary. In short, it means zero implicit trust.
    Zero Trust
    What is the Zero Trust model?
    In 2010, Forrester Research analyst John Kindervag proposed a solution he termed “Zero Trust.”
    It was a shift from the strategy of “trust but verify” to “never trust, always verify.” In the Zero Trust model, no user or device is trusted to access a resource until their identity and authorization are verified. This process applies to those normally inside a private network, like an employee on a company computer working remotely from home or on their mobile device while at a conference across the world. It also applies to every person or endpoint outside of that network. It makes no difference if you have accessed the network before or how many times - your identity is not trusted until verified again. The idea is that you should assume every machine, user, and server to be untrusted until proven otherwise.
    Historically, a castle-and-moat approach to cybersecurity seemed workable - the idea of a network perimeter where everyone outside the network - or moat - was “bad” and everyone inside was “good” once prevailed. Just as castles and moats are a thing of the past, so should be the castle-and-moat approach to security. Just think about the current state of remote work. Today’s workforce and workplace have changed - when, how, and where people do their work have moved beyond the four walls of an office. With the rise of the cloud, the network perimeter no longer exists in the way it used to. Users and applications are just as likely to be outside of the moat as they are inside. That introduces weaknesses in the perimeter that malicious actors can exploit. Once inside the moat, lateral movement is typically unchecked, leading to adversaries accessing resources and high-value assets, like customer data (or the crown jewels!) - or launching a ransomware attack.
    How Zero Trust works
    Imagine the Zero Trust model like an extremely vigilant security guard - methodically and repeatedly checking your credentials before allowing you access to the office building where you work, even if they recognize you - then duplicating that process to verify your identity continuously.
    The Zero Trust model relies on strong authentication and authorization for every device and person before any access or data transfer takes place on a private network, no matter if they are inside or outside that network perimeter. The process also combines analytics, filtering, and logging to verify behavior and to continually watch for signals of compromise. If a user or device shows signs of acting differently than before, it is taken note of and monitored as a possible threat. For example, Marcus at Acme Co. typically logs in from Columbus, Ohio, in the United States, but today, he’s attempting to access Acme’s intranet from Berlin, Germany. Even though Marcus’ username and password were entered correctly, a Zero Trust approach would recognize the anomaly in Marcus’ behavior and take action, such as serving Marcus another authentication challenge to verify his user identity.
    This basic shift in approach defeats many common security threats. Attackers can no longer spend time taking advantage of weaknesses in the perimeter, and then exploiting sensitive data and applications because they made it inside the moat. Now there is no moat. There are just applications and users, each of which must mutually authenticate, and verify authorization before access can occur. Mutual authentication takes place when two parties authenticate each other at the same time, such as a user with a login and password, and an application they are connecting with through a digital certificate.
    What are the components of Zero Trust?
    The Zero Trust security model of today has expanded. There are many implementations of its principles, including Zero Trust architecture, Zero Trust Network Access (ZTNA), Zero Trust secure web gateway (SWG), and microsegmentation. Zero Trust security is also sometimes referred to as “perimeterless security.”
    Don’t think of Zero Trust as one discrete technology. Rather, a Zero Trust architecture uses a variety of security controls and principles to address common security challenges through preventive techniques. These components are designed to provide advanced threat protection as the boundaries between work and home disappear, and an increasingly distributed remote workforce becomes the norm.
    Key capabilities for implementing Zero Trust
    Visibility of on-prem, cloud environments and IoT devices

ความคิดเห็น •