
What is zero trust security?
First, it’s important to understand that zero trust isn’t a product. (You’ll also need more than one product to support it!) Zero trust is a security framework. More specifically, zero trust is a holistic, strategic approach to security that ensures every user and device that is granted access to a company’s resources is who or what they say they are. Zero trust is an embodiment of the old saying: “If you can’t trust anyone, it’s best to trust no one.” Under zero trust, no actor can be trusted until they are verified with appropriate controls—and they are also verified continuously.Why is zero trust relevant now?
The traditional security perimeter barely exists now, and it’s continuing to erode by the minute. In today’s digital world, data is spread across an almost infinite number of services, devices, applications, and people, and that number just keeps growing. Zero trust assumes that the traditional network edge isn’t there. In the modern enterprise, networks can be local, in the cloud, or part of a hybrid model. Resources can be anywhere—and the workers accessing those resources can be anywhere, too. If a business is still trying to secure its digital assets with an outdated model of perimeter security, it’s at risk. If this sounds familiar, it’s time to consider a switch. Even agencies in the federal government are transitioning to zero trust right now. In fact, that’s a key reason that this methodology has been generating so much attention over the past year. In May 2021, the Biden administration issued its Executive Order on Improving the Nation’s Cybersecurity, mandating that federal agencies move to a zero trust security model. Earlier this year, it followed up with the federal zero trust architecture strategy, which outlines specific actions federal agencies need to take to adopt zero trust architecture over the next couple of years. However, many other organizations in the public and private that don’t need to move to zero trust are still deciding to make this journey because they see it as a way to reduce risk and better secure digital transformation. A ESG Research Report shows that this approach to security can result in 50% fewer breaches. But beyond protecting valuable data by reducing the chance of a breach, there’s also a bottom-line benefit to zero trust: Companies spend 40% less on technology because everything is integrated. Also, according to a recent Forrester study, companies that adopted zero trust were twice as confident in their ability to bring new business models and customer experiences to market. Preventing attacks and reducing the risk of data loss are great outcomes of a zero trust approach, of course, but making products and experiences that customers love is what makes a company great.Zero trust security best practices
So, what’s involved in enforcing a zero trust security policy? A lot. It requires the application of an array of security best practices—ones that just make good business sense anyway given the nature of today’s cybersecurity threat landscape. For example, an organization that has adopted a zero trust framework will need to implement practices such as:- Validating the identities of all users through multi-factor authentication (MFA)
- Keeping all devices updated and in good health through vigilant patch management and software updates
- Conducting thorough observation and monitoring to obtain the most valuable data to inform access control implementation
- Limiting access controls to specific applications, resources, data, and assets, rather than the broader network