Intelligent CISO Issue 38 | Page 76

that controls access based on risk . In the cloud-first universe , Zero Trust can reduce threat levels while enhancing compliance . The resultant view for threat assessors is one of user behaviours and device usage mixed with data flows and business processes . This is instrumental in providing a comprehensive real-time picture of emerging threats , which allows rapid action and prevention .
To implement Zero Trust well , IT stakeholders must establish a roster of users and their access levels to data and services . Privileges should follow a strict recipe of trust combined with corporate need . Sensitive material , for example , should be made accessible only to a confirmed identity who needs it for their work .
Bad actors beware
Under Zero Trust practices , identity confirmation should include Multi- Factor Authentication ( MFA ). Rapid detection of anomalies requires constant monitoring of data transfer and user behaviour . MFA should apply to any major transfer or content access , even if a user is already running an authenticated network session . difficult for threat responders when it comes to chasing down an alert . To many false positives make effective mitigation and response problematic at best .
Who do you trust ?
As a remedy , we should adopt a model that carries a default distrust of users , devices and applications , and centres on identity management to keep unwanted parties at bay . In this Zero Trust model , IT teams are back in the driver ’ s seat , with control over the entire network and every component and process within it .
The health of a device , the user ’ s location when accessing the network and a host of other factors will come together to give a trust assessment
Distrust by default may seem distasteful , especially if corporate culture encourages person-to-person trust among team members . Culture changes may require a strong messaging campaign that stresses that digital Zero Trust in no way impugns the character of employees . On the contrary , it is designed to protect them and the company from nefarious outsiders whose motivations are far from charitable .
Zero Trust creates a strong foundation for holistic security , which empowers IT with control over – and confidence in – their environment . The system means bad actors will never be able to provide verified credentials and will be denied access to sensitive data in the cloud . And finally , the cloud can live up to its reputation as a best-ofall-worlds breeding ground for agility and innovation . u
76 www . intelligentciso . com