Could zero trust be the answer to the ransomware threat?

Zero Trust is the latest buzzword being thrown around by security vendors, consultants and policymakers as a solution to allcyber securityA panacea to the problem, some 421 TP3T global organizations say they have plans to adopt zero trust. The Biden administration has also outlined the need for federal networks and systems to adopt a zero-trust architecture. At a time when ransomware continues to make headlines and break new records, could zero trust be the answer to the ransomware woes? Before answering this question, let’s first understand Zero Trust and its core components.

What is zero trust?

The concept of zero trust has been around for a while, most likely as an extension of least privilege access. Zero Trust helps minimize attackers’ lateral movement through the principle of “never trust, always verify” (i.e., the techniques used by intruders to reconnoiter a network). In a zero-trust world, you are not granted implicit trust just because you are behind a corporate firewall (regardless of where you log in from or the resource you are trying to access). Only authorized individuals have access to selected resources as needed. The idea is to shift the focus from a boundary-based (reactive) approach to a data-centric (proactive) approach.

 

Core components of zero trust

To effectively implement Zero Trust, organizations must understand its three core components:

1. Guiding principles:Four guiding principles are the foundational elements of a Zero Trust strategy. These include defining business outcomes (organizations can only effectively protect themselves after knowing what they are trying to protect and where they are); designing from the inside out (identifying resources that require fine-grained protection and building security controls that are closely tied to those resources ); outline identity access requirements (providing more granular access control management for users and devices); inspect and log all traffic (compare authenticated identities against predefined policies, historical data, and context of access requests).

2. Zero trust network architecture:ZTNA consists of protection surfaces (data, assets, applications and service resources that are most valuable to the company); micro-perimeters (which protect resources rather than granular protection of the entire network environment); micro-segmentation (dividing the network environment into different functions based on the business) discrete areas or departments); and context-specific least privilege access (granting access to resources based on job roles and related activities and by enacting the principle of least privilege).

3. Technology to achieve zero trust:There is no one solution to achieve zero trust. That being said, technologies such as identity access management, multi-factor authentication, single sign-on, software-defined perimeters, user and entity behavior analytics, next-generation firewalls, endpoint detection and response, and data leak prevention can help get started with zero trust.

zero trust and

Ransomware Issues Zero Trust is not a panacea for ransomware, but if implemented correctly, it can help create stronger security defenses against ransomware attacks. This is because, fundamentally, human error is the root cause of all cyberattacks, and Zero Trust puts the focus back on user identity and access management. Zero Trust also helps significantly reduce the attack surface because internal and external users only have access to limited resources, while all other resources are completely hidden. Additionally, Zero Trust provides the monitoring, detection, and threat inspection capabilities necessary to prevent ransomware attacks and sensitive data breaches.

There are also some misconceptions about Zero Trust that must be highlighted:

  • Zero Trust will not completely eliminate the ransomware threat, but it will significantly reduce its likelihood.
  • No single technology solution can help you achieve absolute zero trust. Many vendors will try to sell you one, but it's not in your best interest.
  • Zero Trust is not designed to solve all of your security problems. It is designed to reduce the likelihood of a security incident, limit lateral movement, and minimize damage in the event of a security incident such as ransomware.
  • Segmentation of users and resources sounds good in theory, but is quite difficult to implement. Zero Trust is not a quick fix, but a thoughtful, long-term approach to security.

Zero Trust is a strategy similar to digital transformation. It requires commitment from the entire organization (not just the IT team); it requires a change in mindset and a fundamental shift in architectural approach; it requires careful execution and thoughtful consideration, with the long term in mind; and finally, it must be a timeless, ever-evolving process, changing with the evolving threat landscape. Almost half of cybersecurity professionals still lack confidence in applying a zero trust model, and rightfully so – one wrong move could put an organization in a worse position.

That is to say, businesses that successfully implement Zero Trust will be in a better position to combat evolving threats like ransomware, and become a truly cyber-resilient organization.

 

Original article by CNCSO, if reproduced, please credit: https://cncso.com/en/zero-trust-be-the-answer-to-ransomware-html

Like (0)
Previous November 27, 2021 4:09 pm
Next November 29, 2021 2:54 pm

related suggestion