Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

Embracing Digital Transformation

#172 Zero Trust Architecture

09 Nov 2023

Description

In this podcast episode Darren talks with Steve Orrin and Dave Marcus and discusses zero trust architecture, a new security model needed for today's digital environments where the network perimeter is disappearing. Experts explain what zero trust is, key principles like default deny access and continuous authentication, and advice for organizations starting their zero trust journey.Digital transformation initiatives aim to leverage new technologies to improve business processes and deliver better experiences for customers and employees. However, as organizations extend their networks and adopt cloud services, the traditional security model of trusted networks is no longer sufficient. This creates vulnerabilities that cybercriminals can exploit.Zero trust architecture provides a framework to enhance security in today's complex environments. But what exactly is zero trust, and how can organizations start their journey towards implementing it? Factors Driving Zero Trust ArchitectureAt its core, zero trust architecture is about applying continuous, granular policies to assets and resources when users or entities attempt to access or interact with them. This policy gets applied regardless of the location - on premise, cloud, hybrid environments, etc. The key principles are:* Default deny - Access is denied by default. Users must authenticate and be authorized for the specific context.* Continuous authentication - Users are re-authenticated and re-authorized throughout their sessions based on analytics of identity, time, device health, etc.* Microsegmentation - Fine-grained controls are applied for lateral movement between assets and resources.This differs from traditional network security that uses implied trust based on whether something is inside the network perimeter. Getting Started with Zero TrustImplementing zero trust is a continuous journey, not a one-time project. However, organizations need to start somewhere. Here are a few best practices:* Educate yourself on zero trust frameworks and concepts* Map out a workflow for a medium-risk application and identify dependencies* Leverage existing infrastructure - microsegmentation, encryption, visibility tools* Obtain executive buy-in and involve business stakeholders* Start with a solid cybersecurity foundation - hardware roots of trust, encryption, asset inventory* Increase visibility into the operational environment and supply chainWhile zero trust may require new investments in technology and process changes over time, organizations can make significant progress by refining how they use what they already have. Looking AheadAs business applications and resources continue migrating outside the traditional network perimeter, zero trust allows a more dynamic and contextual approach to security. Instead of blanket allowances based on location, granular controls are applied according to the specific access requirements.This journey requires vigilance - policies must adapt as business needs evolve, and new risks emerge. But with the right vision and commitment, zero trust architecture provides a path forward to enable digital innovation and resilience.

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.