Trust is good, zero trust is better

Trust is good, zero trust is better

With the Zero Trust model, no identity or network resource is trusted. The basic assumption that user accounts could always be compromised is a particularly effective way of preventing malicious access.

Trust is good, control is better, goes a common saying. Cyber ​​security has long gone further. In order to be able to counter the sophisticated attacks of cybercriminals at all today, Zero Trust has become one of the most important security models.

With the Zero Trust approach, you try to generally distrust everything and everyone within the company environment in order to minimize any risk of your own network being compromised. The distrust extends to all devices, user accounts and network resources. So Zero Trust always assumes that a security breach has already occurred and that an attacker might have managed to circumvent existing defenses. The basic assumption is therefore also that unauthorized access to other resources could occur anywhere within the entire network.

There are different approaches to applying the Zero Trust model. In addition to the approach of establishing Zero Trust primarily at the network level by subdividing it into several micro-perimeters with segmentation gateways, another approach has recently emerged that focuses more on the identity level. Zero Trust is used to prevent malicious access to resources within the corporate environment. Even if such access is always carried out by a device on the network connection, user authentication is always required in order to be able to access the resource. With the identity-based approach of the Zero Trust model, malicious access is effectively prevented through granular checks not on the network connection, but rather on the authentication itself. The identity-based zero trust is enjoying increasing popularity thanks to its particularly high level of granularity and also because it is easier to implement than the network-based approach.

Identity-based Zero Trust offers even more advantages. Comprehensive behavioral analyzes are possible through the continuous monitoring of all access requests.

Identity-based zero trust also evaluates where the user or resource is at the time of each network access. This enables comprehensive analysis of user behavior, detection of abnormal behavior and identification of potentially compromised users.

Crucial to the success of the identity-based Zero Trust approach, however, is that security officers are able to monitor and investigate every single access attempt in real time – for every user, every resource and every access interface.

The cloud of 2022 is native, composable, anywhere Previous post The cloud of 2022 is native, composable, anywhere
The Firewall Metamorphosis - Next post The Firewall Metamorphosis