Cyber Security

Should Your Enterprise Security Be Zero-Trust?

Organizations are leaning toward the zero-trust model after experiencing multiple enterprise security breaches through employee accounts. This zero-trust approach gives no one an unauthenticated pass when accessing proprietary assets and systems. Its primary method is to view all requests for access as a threat until they successfully pass the relevant identification protocols. Forcepoint’s senior director Jim Fulton explains that zero trust is necessary because of the rise in cloud services popularity. In this article at the Threatpost, Tara Seals clarifies why enterprise security must be zero-trust.

Strengthening Enterprise Security

Fulton adds, “Zero-trust principles are crucial for cloud security, especially for cloud applications that can be potentially accessed from anywhere on the internet.” Since users must authenticate every time they access zero-trust company databases, cybercriminals get fewer chances to infiltrate.

It’s a Cloudy Affair

Applying the zero-trust model to the cloud infrastructure will add several layers to enterprise security. Continuous validation, exclusive permissions, and detection of anomalies in this model should protect companies better. Additionally, a cloud access security broker (CASB) is one of the ‘sensitive applications’ that enhances multi-factor authentication tenfold.

More Visibility But Less Attack Surface

Incorporating the zero-trust approach into your organizational security serves two purposes. It gives you a granular view of the susceptible areas and thereby allows you to reduce those attack surfaces.

How to Ensure Zero-Trust Enterprise Security

The approach cannot be integrated overnight but must be one of the long-term company security goals. Trend Micro cybersecurity VP Greg Young predicts that the mid-sized companies will profit the most from the zero-trust model. But they should start small first. Choose your processes that require minimum effort for implementation or prioritize critical resources. Meanwhile, secure access service edge (SASE) technologies should combine CASB, ZTNA, and secure web gateway functions. This enables SMBs to have a centralized enterprise security control panel.

To view the original article, please visit this link: https://threatpost.com/zero-trust-guide/179377/

Related Articles

Back to top button
X

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.