IT disaster recovery, cloud computing and information security news

Cybersecurity moves into the era of zero trust

Organizations need to take a new approach to information security if they are to successfully protect their networks and assets. Zero trust is the way forward to a more effective, simpler and more consistent security architecture says Adam Boone.

The very successful digitisation trend over the past 20 years has produced huge efficiencies in every type of corporation and government. But the dark side is that the security industry has largely failed to evolve the standard security architecture to keep pace with these broader changes in IT.

The firewalled perimeter remains the primary defence in IT security. Yet every major data breach in the pandemic of breaches taking place around the world shows how simply firewalls can be bypassed. If a government worker clicks on the wrong email and falls prey to a phishing attack, a hacker can leapfrog the firewall and browse at will through the government agency’s digitised records and applications.

The explosion of IT systems, networks, users, clouds and devices has caused the size of the typical enterprise’s attack surface to expand exponentially. Any user or device can be the weakest link and become the steppingstone to a major data breach.

Billions of dollars in venture capital over the past five years has been poured into start-ups trying to improve IT security. Yet industry statistics show that today the typical data breach still goes undetected for months. That’s an eternity for malware and advanced persistent threats to be loose in your systems. And most of the largest vendors continue to make a lot of money selling the same old security architecture, doing nothing to truly fix the problem.

There are new security techniques that are proving to be effective and that do not require the enterprise or agency to cut off Internet connectivity.  One such strategy is called the ‘zero trust’ or ‘no trust’ model.

The old security architecture is built with the idea that you can use a firewall to keep unauthorised people out of the enterprise systems. This internal network is considered to be ‘trusted’ and users who are authenticated and given access are likewise assumed to be trusted. This trust model is obsolete as every major data breach since the Target hack has shown.

Instead, enterprises are starting to adopt a zero trust model that assumes no network, user, device or application can ever be fully trusted. Instead, you assume that the network is already compromised, that a user actually is a hacker with stolen credentials, or that a device contains malware. With that assumption, how do you design the IT security architecture to minimise the damage?

IT security architects are deploying more sophisticated internal controls, segmenting and isolating applications by enforcing stronger rules on who should access them, even when the user is inside the network. Role-based access control is one such technique, inspecting the internal network traffic at various points and blocking attempts to access applications by users who don’t meet certain rules. Another technique is to use strong encryption to isolate internal applications so that if a hacker compromises a network device, the hacker cannot access the application traffic flowing through it.

But in addition to these better internal controls, the security industry as a whole must focus on making security easier to deploy and easier to manage. The typical security architecture is fragmented and splintered across IT silos, with different tools, different access policies, and different controls in the LAN, WAN, Internet, mobile network, cloud, data centre / center and elsewhere. This means setting up and managing consistent, uniform security policies across all of these silos is extremely hard.

Until the security industry makes it easier for organizations to deploy a simpler, more consistent security architecture, the gaps left by fragmentation are going to remain the gateway for hackers to exploit. It is only by changing the way the security architecture is viewed that positive advances in the industry will really be seen.

The author

Adam Boone is CMO of Certes Networks.



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.