What is the zero-trust cyber security concept? Most governments are facing increasing pressure to improve their cybersecurity defenses. Data is becoming more valuable each passing day. Security is the basic responsibility of any nation or organization.
This is comparable to the warning signs your laptop tells you about viruses when you visit malicious sites or Antivirus applications like Kaspersky alerting you of harmful files or viruses infecting your PC/Mac.
The traditional barricades of keeping intruders out are not effective enough; as Hackers now access the servers of major nations and organizations stealing their data and monies.
Companies need to safeguard against insider theft and cybercriminals. Increase ways to avoid data leakages and potential cyber hazards.
The concept “Zero-trust security” is a model that presumes that all traffic on a network could be a threat; and requires every user to be verified and authorized before being granted access to any sensitive application or data.
New Zealand’s Central Bank Suffers Cyberattack To Its Data Systems
Microsoft Teams Fixes Security Flaw That Allows Cyberattacks Using GIFs
Dell Issues Security Patch To Fix Bug Plaguing Its Computers Since 2009
This concept creation is credited to cyber security industry veteran John Kindervag in 2010. Another advocator of this concept is Federal Chief Information Security Officer Chris DeRusha.
Following the recent hacks in the United States, various federal agencies have published guidance on how to implement the zero-trust model. The White House appears to be contemplating whether to create a special office dedicated to increasing zero-trust adoption.
Interestingly on May 10, the New York Times reported that federal agencies would be required to take a zero-trust approach to software vendors under a new executive order aimed at strengthening cybersecurity.
Micheal Leofflad in his article wrote about 3 steps that federal Information technology organizations can take to get to zero trust security.
Firstly, being upfront and honest about the security in place currently; how strong is the organization able to track users and devices, how they access data and applications and what authentication/authorization platforms are in place?
Secondly, knowing where the data resides; having a precise inventory of what data is out there and where. The mixture of a public and private data center has created a whole new level of risk that has managed by solid inventory.
Lastly, all manual processes have to be automated; this will intelligently identify and analyze all data stored in the cloud, which will help security teams speedily address any threats.
Even big technology companies are vulnerable to cyber-attacks and hacks; so they have to be prepared. The zero-trust security approach is a solid move in the right direction.
For your daily dose of tech, lifestyle, and trending content, make sure to follow Plat4om on Twitter @Plat4omLive, on Instagram @Plat4om, on LinkedIn at Plat4om, and on Facebook at Plat4om. You can also email us at email@example.com; and join our channel on Telegram at Plat4om. Finally, don’t forget to subscribe to our YouTube channel HERE.