An emerging security paradigm for the post pandemic world


Data security continues to be in top-of-the-mind with the continuing danger of cyber-attacks. Traditional data protection techniques appear to function under a “trust but verify” strategy, a perimeter-driven paradigm that trusts unobstructed network access to internal users, while the only network in need of security controls is the external or “untrusted network. Often misplaced trust is a vulnerability that migrates into the IT landscape of an organization which is where the Zero Trust Architecture (ZTA) model plays an integral role.

Zero Trust Architecture is a security paradigm that fixes the inherent weakness of conventional strategies that only data outside an entity needs to be secured. This new paradigm requires the organization to continuously analyze and evaluate the risks involving their internal IT assets and business functions, and form strategies to mitigate them. ZTA model restricts access by providing it to only those in need at a time depending on whether they are successful in the authentication of each access request. This helps eliminate unauthorized access to data and services and employs a positive security enforcement model.

The Zero Trust model uses a different lens to view data protection, allowing criteria that govern access and restrictions. Organizations have little or no oversight or influence over network and data use in a legacy network, but with a Zero Confidence Architecture, all network traffic is seen by the segmentation gateway containing the strictly implemented granular data, device, or asset access policy.

While we are focusing on digital tenets of an organization, we should not forget that effective cybersecurity is also an essential enabler of digital transformation. If consumers won’t trust a business with their data, they will not engage with that business. To establish the user’s inherent digital trust, it is important for all integral parts of the digital ecosystem to perform their role to secure consumers’ data and protect their valuable assets.

READ  Budget 2021: Curing and vaccinating India’s international trade

There are many misconceptions surrounding Zero Trust Architecture model —from its overall functionality to implementation. Here are the five major aspects of Zero Trust Architecture that can help organizations maximize data security:

  1. Prioritize top risks (e.g., threats, brand image, penalties, compliance): understanding the attack surface and threat landscape is important to qualify risks and prioritize the ones that need the maximum focus.
  2. Enterprise-wide policy with an automated rule base: organizations should set policies according to sensitivity of services, assets and data housed by them. The power of ZTA comes from the access policies that the organizations define.
  3. Leverage micro-segmentation and granular perimeter enforcement: organizations should always assume the network is hostile. They should not trust any user or any incident. This means removing implicit trust from the network and building trust into the devices and services.
  4. Architect Zero Trust Network based on inside-out view and the way data is used transitionally: organizations should include ZTA as part of the overall transformation strategy. They should implement technologies that help achieve Zero Trust as we move more to the cloud and retire old legacy systems.
  5. Never trust any user, app, network or device, keep adding context dynamically and keep roles and access privileges updated: organizations should work on the authentication of their users, devices and workloads. They should enforce technologies such as multifactor authentication, privilege ID management, behavioral analytics and file system permissions based on the defined rules to minimize compromise of trust.

Lost or stolen data, exfiltrated Intellectual Property and other types of breaches cost organizations money and damage their reputation. Avoiding such occurrences is key to a successful ZTA adoption. The ZTA model helps in standardizing access control enforcement across all enterprise resources with continuity of critical business processes and improved compliance. It is most effective when integrated across the organizations’ entire digital IT estate. The goal is to be agile, dynamic and in continuous verification mode to assess the risk and take educated access control decisions. But organizations need to balance the users’ online experience while minimizing exposures and improving their protection against eminent cyberthreats.

READ  UPDATE 5-U.S. announces $19 bln coronavirus aid for farmers, food buys for poor

Each step taken in this regard is likely to make a difference in reducing the risk and building trust in the digital IT estate of the organization. Overall, it has the potential to elevate the organization’s security posture and protect its assets against eminent cyber threats.

Murali Rao is Cyber Security Leader and Shivaprakash Abburu is Executive Director – Cyber Security, EY India.

(The one-stop destination for MSME, ET RISE provides news, views and analysis around GST, Exports, Funding, Policy and small business management.)

Download The Economic Times News App to get Daily Market Updates & Live Business News.



READ SOURCE

LEAVE A REPLY

Please enter your comment!
Please enter your name here