Share this article on:
Powered by MOMENTUMMEDIA
For breaking news and daily updates,
subscribe to our newsletter.
The widespread introduction of hybrid working has changed the rules of the game when it comes to IT security. Sash Vasilevski from Security Centric explores.
Rather than relying solely on perimeter defences, organisations now need to find other ways to protect users and assets regardless of their location. Those assets could be on-premise, on a cloud platform or at a user’s home.
One approach gaining increasing attention is zero trust. It’s a strategy that is built on a range of underlying security principles including defence in depth, the separation of authentication and authorisation, least privilege and network segmentation.
What zero trust is not is a security silver bullet. There are numerous tools on the market that claim to deliver it but, in reality, the strategy requires a number of steps and a variety of different components.
Some clear guidance on what is required has been provided by both the US-based National Institute of Standards and Technology (NIST) and the Australian Cyber Security Centre (ACSC). According to NIST, the key requirements for zero trust are:
Rather than being achieved through the deployment of a single software tool or process, true zero trust requires the introduction of a portfolio of components and activities to be truly effective. It’s important to understand exactly what exists within your infrastructure, what risks are being faced and exactly what needs to be done to overcome these.
Thankfully, most organisations will already have in place many of the resources required to achieve a zero-trust strategy and so won’t need to start from scratch. It’s a matter of building on existing security measures and extending these to cover all resources within their information environment – be that on-premise, cloud or a combination.
Flexible and hybrid work practices are likely to remain a feature of life in coming years. Taking the steps necessary to achieve true zero trust will be well worth the effort.
Sash Vasilevski is the principal at Security Centric.
Be the first to hear the latest developments in the cyber industry.