{"id":88262,"date":"2024-03-10T13:45:54","date_gmt":"2024-03-10T11:45:54","guid":{"rendered":"https:\/\/www.aegis-cs.eu\/?p=88262"},"modified":"2024-03-10T14:04:10","modified_gmt":"2024-03-10T12:04:10","slug":"embracing-zero-trust-security-post-covid-world","status":"publish","type":"post","link":"https:\/\/www.aegis-cs.eu\/?p=88262","title":{"rendered":"Zero Trust Security: Regaining Control in a Changing Landscape"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"88262\" class=\"elementor elementor-88262\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-160a854 e-flex e-con-boxed e-con e-parent\" data-id=\"160a854\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3012475 elementor-widget elementor-widget-text-editor\" data-id=\"3012475\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The concept of zero trust security was first defined in 2010 by Forrester analysts. It is becoming increasingly relevant for organizations. The Covid-19 pandemic has rendered traditional network perimeters obsolete. Eliminating or reducing trust in the network environment and connected devices is critical. Organizations must defend against proliferating security threats in today&#8217;s business landscape.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fbb19ae elementor-widget elementor-widget-text-editor\" data-id=\"fbb19ae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Modern developments like mobile computing, remote work, and SaaS mean traditional perimeter security is insufficient. Zero trust addresses the need to meet complex security requirements. These strain organizations&#8217; perimeter-based security measures.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97ccef7 elementor-widget elementor-widget-heading\" data-id=\"97ccef7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is Zero Trust Security?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a099f41 elementor-widget elementor-widget-text-editor\" data-id=\"a099f41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero_trust_security_model\">Zero trust<\/a>\u00a0security means no user, device, or network traffic is trusted by default. This applies inside or outside an organization&#8217;s network. Appropriate controls must reduce unauthorized access risk to an acceptable level. The model mandates defense-in-depth mechanisms.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ceeca51 elementor-widget elementor-widget-text-editor\" data-id=\"ceeca51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Implementing zero trust changes the traditional &#8220;trust but verify&#8221; model. Devices connected to an internal network were assumed to be mostly authorized. The new approach is &#8220;never trust, always verify&#8221;. Every device must pass identity and security policy checks to access corporate resources. Access control is limited to the minimum required.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f128c3c elementor-widget elementor-widget-heading\" data-id=\"f128c3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key Elements and Benefits<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f217a6d elementor-widget elementor-widget-heading\" data-id=\"f217a6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A zero trust architecture typically combines the following controls:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-176b776 elementor-widget elementor-widget-text-editor\" data-id=\"176b776\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-disc pl-8 space-y-2\"><li class=\"whitespace-normal\">Unified endpoint management for all devices, company-owned or BYOD<\/li><li class=\"whitespace-normal\">Single sign-on for seamless user authentication across systems<\/li><li class=\"whitespace-normal\">Multi-factor authentication using various factors beyond passwords<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b99d4c elementor-widget elementor-widget-heading\" data-id=\"5b99d4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Adopting a zero trust approach delivers several benefits:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b7da3 elementor-widget elementor-widget-text-editor\" data-id=\"28b7da3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul class=\"list-disc pl-8 space-y-2\"><li class=\"whitespace-normal\">Dynamic securing of user\/device connections to resources\/applications<\/li><li class=\"whitespace-normal\">Facilitating secure access across hybrid, multi-cloud environments<\/li><li class=\"whitespace-normal\">Reducing insider threats and attacks within the organization&#8217;s network<\/li><li class=\"whitespace-normal\">Improving compliance visibility and control over access activities<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-884b277 elementor-widget elementor-widget-heading\" data-id=\"884b277\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Implementing Zero Trust<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46afbac elementor-widget elementor-widget-text-editor\" data-id=\"46afbac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organizations should create a phased zero trust strategy. Consider how to approach it and who will lead the effort. The dedicated zero trust team should include members from key areas. These include applications, data security, network security, infrastructure, and identity and access management.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d87a47 elementor-widget elementor-widget-heading\" data-id=\"3d87a47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Key implementation steps include:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8af216c elementor-widget elementor-widget-text-editor\" data-id=\"8af216c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol class=\"list-decimal pl-8 space-y-2\"><li class=\"whitespace-normal\">Assess the environment to understand existing controls and data flows<\/li><li class=\"whitespace-normal\">Review emerging zero trust enabling technologies<\/li><li class=\"whitespace-normal\">Launch foundational zero trust initiatives based on capability gaps<\/li><li class=\"whitespace-normal\">Define operational security changes to avoid gaps as practices evolve<\/li><li class=\"whitespace-normal\">Deploy, measure, assess, and iterate for continuous improvement<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9977281 elementor-widget elementor-widget-text-editor\" data-id=\"9977281\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cost concerns exist, but a gradual, phased approach can help. Start with identity and other critical controls. Organizations can progressively mature towards a comprehensive zero trust architecture.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8906456 elementor-widget elementor-widget-heading\" data-id=\"8906456\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Post-Covid Imperative<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-68746b6 elementor-widget elementor-widget-text-editor\" data-id=\"68746b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The relevance of zero trust has increased post-Covid. IT environments are becoming more decentralized and distributed. Remote work is common, with more people accessing corporate and cloud resources over home networks using personal devices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca45d79 elementor-widget elementor-widget-text-editor\" data-id=\"ca45d79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Guidance like <a href=\"https:\/\/www.aegis-cs.eu\/?our_services=vciso-services\">NIST&#8217;s<\/a> SP 800-207 is driving adoption. Organizations face rising compliance requirements to implement reasonable security practices. Although zero trust is a framework rather than a single product, cybersecurity vendors are adapting their offerings to support zero trust approaches.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d4b46d8 elementor-widget elementor-widget-text-editor\" data-id=\"d4b46d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a rapidly digitizing post-Covid world, users, devices, and application workloads move beyond corporate network boundaries. The traditional perimeter enforcement model is no longer suitable. Zero trust is the most relevant security model for current requirements. It aligns with the need to treat everything as potentially compromised until identity and access is verified.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9d9a15e elementor-widget elementor-widget-text-editor\" data-id=\"9d9a15e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Organizations should embrace zero trust principles. This enables workers to securely access cloud and on-premises services. Assess existing toolsets to fill gaps in zero trust support and retire tools that don&#8217;t support a zero trust transition. By doing so, organizations can better meet evolving cybersecurity needs in an increasingly digital, distributed, mobile, and cloud-driven world.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The concept of zero trust security was first defined in 2010 by Forrester analysts. It is becoming increasingly relevant for organizations. The Covid-19 pandemic has rendered traditional network perimeters obsolete. Eliminating or reducing trust in the network environment and connected devices is critical. Organizations must defend against proliferating security threats in today&#8217;s business landscape. Modern&hellip;<\/p>\n","protected":false},"author":2,"featured_media":88264,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":false,"datetime":null,"platforms":[],"status":"template_only","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[5],"tags":[],"class_list":["post-88262","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry"],"_links":{"self":[{"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=\/wp\/v2\/posts\/88262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=88262"}],"version-history":[{"count":10,"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=\/wp\/v2\/posts\/88262\/revisions"}],"predecessor-version":[{"id":88274,"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=\/wp\/v2\/posts\/88262\/revisions\/88274"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=\/wp\/v2\/media\/88264"}],"wp:attachment":[{"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=88262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=88262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aegis-cs.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=88262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}