TECH TRENDS to rules , controls and absolutes rather than decisions as to whether things are good or bad .
What is Zero Trust and how can the lack of proper implementation lead to security vulnerabilities for a company ?
Probably the best definition I have read was in the US government ’ s comprehensive federal response to the cyberattack targeting the Colonial Pipeline . In May 2021 , the US Colonial Pipeline fell victim to a cybersecurity attack that involved ransomware , forcing it to temporarily shut down all pipeline operations . Colonial transports nearly half of the East Coast ’ s fuel supply through a system that spans over 5,500 miles between Texas and New Jersey . This pipeline supplies the military and transports gasoline , diesel , home heating oil and jet fuel .
The US government , in a bid to fortify its security , released an executive order mandating Zero Trust for all organisations or groups already doing business or intending to deal with the federal government . As part of this mandate , the government defined what it meant by Zero Trust . A part of it said it ' s about ‘ removing implicit trust . Assume a breach is inevitable or has already likely occurred . So , constantly limit access to only what is needed .’
I think that ' s a brilliant way of approaching Zero Trust and security , to assume the bad guy is already in your system . And if you ’ re removing implicit trust , this means you ' re adding explicit trust .
When organisations approach security by assuming the bad guy already has access to their servers , knows all their passwords and with the conscious effort to limit access to only what is needed , that approach will change their security level .
What are some of the benefits an organisation will enjoy by implementing the right Zero Trust platform approach ?
First , it gives administrators complete control over what runs on the machines and control is such a key factor . Working in this business
ZERO TRUST IS THE ANSWER TO SAFELY SECURING ALL ENDPOINTS AND PROTECTING NETWORKS AND DATA FROM BOTH KNOWN AND UNKNOWN ATTACKS .
www . intelligentcxo . com
15