Technology Magazine July 2021 | Page 87

Mirgrating to a zero trust architecture

Mirgrating to a zero trust architecture

future for computer security , despite describing it as currently being another buzzword for many companies .
“ Using real zero trust protection tools really is the right thing to be doing . Right now , most trust is binary and before you authenticate , you are not trusted at all because once you ’ re logged in you can do anything your account is permissioned to do . What Zero Trust says is we are going to constantly monitor you and your actions and give you a risk score that ranks you at all times . If that rank becomes high risk , you will be denied or asked to do another authentication .
“ The great thing about zero trust is that it is designed to evaluate your risk regardless of where you are logging in from , being it from a company desktop , inside the
Implementing a ZTA is a journey rather than a wholesale replacement of infrastructure or processes . An organisation should seek to incrementally implement zero trust principles , process changes , and technology solutions that protect its highest value data assets . Most enterprises will continue to operate in a hybrid zero-trust / perimeterbased mode for an indefinite period while continuing to invest in ongoing IT modernization initiatives . Having an IT modernisation plan that includes moving to an architecture based on ZT principles may help an enterprise form roadmaps for small scale workflow migrations
How an enterprise migrates to a strategy depends on its current cybersecurity posture and operations . An enterprise should reach a baseline of competence before it becomes possible to deploy a significant ZT-focused environment [ ACT-IAC ]. This baseline includes having assets , subjects , business
processes , traffic flows and dependency mappings identified and cataloged for the enterprise . The enterprise needs this information before it can develop a list of candidate business processes and the subjects / assets involved in this process .
ZERO TRUST ARCHITECTURE , AUGUST 2020 | Scott Rose , Oliver Borchert , Stu Mitchell , Sean Connelly
technologymagazine . com 85