Go to Content

We are the flag of Portugal on the internet

Blog

Ricardo Pires
.PT Cybersecurity Manager
20-11-2023
The role of Zero Trust in the future of cybersecurity
In a context marked by accelerated digital transformation and the continuous growth in the number and sophistication of cyberthreats, the "Trust but verify" model of cybersecurity is becoming increasingly remote from good practices in information security management.

The explosive growth of incidents with impacting consequences on the operations of sectors that are essential to the continued development of socio-economic activities, ranging from Ransomware to Databreachs, most of which are initiated by compromising credentials using social engineering techniques, has reinforced the need to combat these threats through new cybersecurity approaches. Zero Trust has emerged to respond to these challenges, representing a fundamental change in the cybersecurity paradigm.

Zero Trust represents a radical departure from the conventional security model, based on apparently simple but profoundly impactful principles, adopting the "Never trust, always verify" model. Instead of starting from the traditional view that everything inside the company's network is reliable, this model assumes that everything inside our "castle" is already or will be compromised.

The implementation of Zero Trust will be absolutely critical in the coming years for organizations to ensure that they can mitigate the severe impacts of cyberattacks. Zero Trust is not just a set of technologies that you put in place to solve the problem, it is a new cybersecurity stance. In practice, Zero Trust seeks to respond to the following key principles:

  • Verify: all users, devices or systems attempting to access resources must be authenticated and authorized.
  • Limit the "impact radius": minimum access required to complete tasks, reducing the risk of unauthorized access and impact.  
  • Monitor continuously: Continuous monitoring and analysis of network traffic, user behavior and system activity to detect and respond to potential threats in real time.
  • Adapt and respond: Collect behavioral and contextual data from the entire technological environment in order to be able to respond quickly and incisively.

Fortinet's global "State of Zero Trust 2023" report reveals that organizations' efforts to implement Zero Trust are moving in a positive direction (66%), but that there are still many barriers to implementation due to the lack of integration between the different solutions available on the market (48%).

What are the steps to implementing Zero Trust in an organization?

To ensure a safe transition from a traditional approach to a Zero Trust security approach, reducing cybersecurity risks, we must start by:

1. Identifying and classifying assets:

The organization's digital assets should be identified, including data, applications, servers and services. Next, the most critical assets for business continuity should be identified and their protection prioritized.

2.     Controlling Identity and Access:

Implement robust Identity and Access Management (IAM) solutions, including multi-factor authentication (MFA), to verify and authorize users/devices. The principle of least privilege must not be forgotten in order to limit access to only what is necessary for each user/device.

3.     Segment the network:

Divide the network into segments allowing only the necessary traffic between them in order to limit attackers' opportunities for lateral movement and reduce the attack surface.

4.     Monitor and analyze continuously:

Implement real-time monitoring solutions for systems and applications, such as a SIEM, and ensure that there are specialized professionals continuously analyzing the security status of the infrastructure.

5.     Protect endpoints and data:

Implement security on endpoint devices with solutions such as endpoint detection and response (EDR) and ensure that security updates are always applied. You should also encrypt all confidential data in transit and at rest, protecting it from unauthorized access.


This article was originally published on Portal Directions.



Please note: the articles on this blog may not convey the opinion of .PT, but of its author.
Back to Posts