{"id":5860,"date":"2020-07-26T07:09:14","date_gmt":"2020-07-26T07:09:14","guid":{"rendered":"https:\/\/web3unplugged.io\/blog\/?p=5860"},"modified":"2020-07-26T07:09:16","modified_gmt":"2020-07-26T07:09:16","slug":"zero-trust-a-practical-approach-to-cybersecurity","status":"publish","type":"post","link":"https:\/\/web3unplugged.io\/blog\/zero-trust-a-practical-approach-to-cybersecurity\/","title":{"rendered":"Zero Trust:  A Practical Approach To Cybersecurity"},"content":{"rendered":"\n<p>Trust is a dangerous word in the information technology field, especially when that trust is implicit \u2013 when it\u2019s unqualified or unquestioned.<\/p>\n\n\n\n<p>Creating a large, sealed-off corporate network security perimeter and trusting everything inside of it h<a>a<\/a>s proven time and again to be a flawed design. The old \u201ccorporate network\u201d model with static defenses is incompatible with the cloud, transient users, remote working or unknown devices. A paradigm shift is required.<\/p>\n\n\n\n<p>Zero trust is a holistic approach to security that addresses threats and changes in how businesses work. It&#8217;s a model and a philosophy for organizations on how to think about and how to do security. The model guides you to treat all devices as if they were internet-facing and, instead of having one single perimeter, you must create many micro perimeters (or microsegments), applying checks and controls around everything and between everything. Some of the benefits of adopting a zero trust model are<\/p>\n\n\n\n<p><strong>Control of the entire IT estate<\/strong><\/p>\n\n\n\n<p>From inside the office all the way to the cloud platforms you use. No more lack of control outside the corporate perimeter or struggles with remote users.<\/p>\n\n\n\n<p><strong>Manage and secure all users in the same way<\/strong><\/p>\n\n\n\n<p>By no longer seeing things as inside or outside the corporate perimeter, you can treat all users in the same way. This both simplifies IT security while also ensuring all devices and users are treated equally.<\/p>\n\n\n\n<p><strong>Maintain security even when you don\u2019t own\/have full control over the infrastructure in use<\/strong> By using identity, location, device health, MFA, and overlaying monitoring and analysis, you\u2019re still able to have strong security across any kind of environment, platform, or service.<\/p>\n\n\n\n<p><strong>Drastically reduce the movement of malware or attackers<\/strong><\/p>\n\n\n\n<p>Rather than having free rein of the entire network once they\u2019re inside, attackers only have access to the bare minimum of systems the compromised user had access to. By continuing to distrust the authenticated user, checks will be in place between those systems, further limiting the ability to spread.<\/p>\n\n\n\n<p>From a disease control perspective, social distancing and a complete lockdown is a concept that is extremely useful, when it\u2019s well-implemented. It\u2019s the same with zero trust in the cyber security world. Currently cybersecurity experts suggest trust nothing. Ever. For when you trust nothing, you are forced to seek relevant security measures wherever there is a risk. Verify everything. Do not assume that passing a check naturally affords trust. Having credentials doesn\u2019t mean you are trustable. It just means you have credentials. And credentials can be stolen. Zero trust is the ultimate security model that will protect organizations from all kinds of cyber threats and assist in business continuity during the pandemic.<\/p>\n\n\n\n<p>It takes a lot of technologies to secure all the resources and assets you\u2019ll have on a network. A zero trust technology stack needs to address two major areas \u2013 the management of zero trust, and the security and control of your various resources and assets.<\/p>\n\n\n\n<p>Management is broken into three sub-areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Automation and orchestration \u2013 for defining dynamic policies, coordinating all the different technologies, and putting everything into place<\/li><li>Visibility and analytics \u2013 for maintaining oversight of the network and ensuring everything is working as well as identify threats and breaches if or when they occur<\/li><li>APIs \u2013 for integrating your various technologies together, getting data out of one system and into another<\/li><\/ul>\n\n\n\n<p>Resources and assets are broken down into five sub-areas:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>People \u2013 the users, admins, etc. who work for or with your business<\/li><li>Data \u2013 the lifeblood of all organizations and perhaps the most important asset to secure<\/li><li>Devices \u2013 the servers, laptops, virtual machines, etc. you use to conduct your business<\/li><li>Workloads \u2013 the services and apps you use to process data, perform calculations, generate reports, etc Networks \u2013 the communication channels over which data flows, web, email, Wi-Fi, the internet, and so on<\/li><\/ul>\n\n\n\n<p>As it stands, Zero trust &#8211; is the future of the cybersecurity space. Currently very few organizations are able to readily embrace it. However, as security perimeters continually erode, the need for adoption will become increasingly prevalent. Cybercriminals are only getting more innovative and defences are struggling to keep up with this. The zero trust model represents a way to truly minimize threats all the while setting new standards in cybersecurity protocol.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trust is a dangerous word in the information technology field, especially when that trust is implicit \u2013 when it\u2019s unqualified or unquestioned. Creating a large, sealed-off corporate network security perimeter and trusting everything inside of it has proven time and again to be a flawed design. The old \u201ccorporate network\u201d model with static defenses is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":5861,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-5860","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"rttpg_featured_image_url":{"full":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-scaled.jpg",2560,2260,false],"landscape":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-scaled.jpg",2560,2260,false],"portraits":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-scaled.jpg",2560,2260,false],"thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-150x150.jpg",150,150,true],"medium":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-300x265.jpg",300,265,true],"large":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-1024x904.jpg",1024,904,true],"1536x1536":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-1536x1356.jpg",1536,1356,true],"2048x2048":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-2048x1808.jpg",2048,1808,true],"post-thumbnail":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-scaled.jpg",476,420,false],"graptor-sq-xs":["https:\/\/web3unplugged.io\/blog\/wp-content\/uploads\/2020\/07\/Ajay-Nawani-Head-Sales-Engineering-MEA-Sophos-scaled.jpg",100,88,false]},"rttpg_author":{"display_name":"admin","author_link":"https:\/\/web3unplugged.io\/blog\/author\/admin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/web3unplugged.io\/blog\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","rttpg_excerpt":"Trust is a dangerous word in the information technology field, especially when that trust is implicit \u2013 when it\u2019s unqualified or unquestioned. Creating a large, sealed-off corporate network security perimeter and trusting everything inside of it has proven time and again to be a flawed design. The old \u201ccorporate network\u201d model with static defenses is&hellip;","_links":{"self":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/5860","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/comments?post=5860"}],"version-history":[{"count":1,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/5860\/revisions"}],"predecessor-version":[{"id":5862,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/posts\/5860\/revisions\/5862"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media\/5861"}],"wp:attachment":[{"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/media?parent=5860"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/categories?post=5860"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web3unplugged.io\/blog\/wp-json\/wp\/v2\/tags?post=5860"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}