Intelligent CISO Issue 38 | Page 75

To implement Zero Trust well , IT stakeholders must establish a roster of users and their access levels to data and services . www . intelligentciso . com
The convenience of quick delivery was impossible to refuse . Being able to go – almost overnight – from a cumbersome , on-premises business with little or no capacity for remote work , to an agile , work-from-anywhere enterprise with scalable infrastructure and predictable costs was something no business could pass up when faced with the realities of lockdowns and social distancing .
Perimeters become irrelevant
But every element – device , platform , service , domain – added to the corporate network during the transition brought risk to the business . The attack surface ballooned and personal data and intellectual property found themselves in new jeopardy . Indeed , to the cybercriminal , the Coronavirus was the gift that kept on giving . They cynically leveraged the pandemic in phishing campaigns , posing as health providers or global medical research centres to lure a fearful public to fake websites or other unsafe resources . Other campaigns simply exploited known vulnerabilities in widely used applications to gain access to networks .
Such campaigns end with an attack that has already breached the perimeter . If preventative measures such as firewalls , VPNs and security information and event management ( SIEM ) are all that exist to protect sensitive data , they will fail in these new hybrid environments . Simplicity in hybrid networks is reserved for the end-user . Complexity is the architectural reality ; and that complexity can lead to problems in a miasma of cloud services and applications . IT may try to rein in users and their devices by patching together a tapestry of solutions , but multi-vendor suites only add more headaches . And they can make life

To implement Zero Trust well , IT stakeholders must establish a roster of users and their access levels to data and services . www . intelligentciso . com

75