Lead Machine Pink 160x1200

Lead Machine Pink 160x1200

iTWire TV 705x108

Friday, 17 December 2021 00:23

Why zero trust is critical in the modern hybrid workplace

By Sash Vasilevski, principal at Security Centric
Sash Vasilevski, Principal at Security Centric Sash Vasilevski, Principal at Security Centric

GUEST OPINION: The widespread introduction of hybrid working has changed the rules of the game when it comes to IT security.

Rather than relying solely on perimeter defences, organisations now need to find other ways to protect users and assets regardless of their location. Those assets could be on-premise, on a cloud platform, or at a user’s home.

One approach gaining increasing attention is zero trust. It’s a strategy that is built on a range of underlying security principles including defence in depth, the separation of authentication and authorisation, least privilege, and network segmentation.

What zero trust is not is a security silver bullet. There are numerous tools on the market that claim to deliver it but, in reality, the strategy requires a number of steps and a variety of different components.

Some clear guidance on what is required has been provided by both the US-based National Institute of Standards and Technology (NIST) and the Australian Cyber Security Centre (ACSC). According to NIST, the key requirements for zero trust are:

1. Treat all data and systems as resources:
Controls must be applied to anything within an IT infrastructure that is a resource. This includes everything from a Word file on a server through to a complex application running on a cloud platform.

2. Secure all communication:
All data traffic between devices, applications, and databases needs to be secured. Encryption is an effective way to achieve this, and it should also be extended to protecting data at rest. This approach can also provide solid protection against ransomware attacks.

3. Grant access to resources on a per-session basis:
Security can be further enhanced if there is no persistence of access. In practice, this means that users and applications need to be authorised each and every time they seek access to a resource. Just because someone has logged on once, this should not mean they have ongoing access.

4. Implement dynamic authorisation:
In a zero-trust environment it’s important to rely on more factors than simply log-in credentials. Other variables should be added to the mix including geographic location, the device being used, and the historical activity of the party requesting access. Part of this process will involve examining behavioural characteristics to determine that a user or resource is actually who or what they claim to be.

5. Monitor and measure the posture of assets:
Resources and activity on a network should be monitored to determine what constitutes normal operating conditions. Once this has been confirmed, security teams can then respond when activities occur that fall outside those parameters which could be security incident indicators.

6. Make authentication and authorisation dynamic:
It’s important to avoid keeping authentication and authorisation in place for extended periods. Users and applications should be required to constantly prove their identity before being granted access to the resources or services they are requesting.

7. Collect as much information as possible on current assets:
A lot of information can be collected from enterprise IT systems, but unfortunately much of it is not acted upon. An example could be workflows that are bypassing security policies or intent. Such activity should be flagged for closer inspection to determine whether it is authorised or being conducted by a malicious party.

Rather than being achieved through the deployment of a single software tool or process, true zero trust requires the introduction of a portfolio of components and activities to be truly effective. It’s important to understand exactly what exists within your infrastructure, what risks are being faced, and exactly what needs to be done to overcome them.

Thankfully, most organisations will already have in place many of the resources required to achieve a zero trust strategy and so won’t need to start from scratch. It’s a matter of building on existing security measures and extending them to cover all resources within their information environment – be that on-premise, cloud or a combination.

Flexible and hybrid work practices are likely to remain a feature of life in coming years. Taking the steps necessary to achieve true zero trust will be well worth the effort.

Read 1103 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here


Thoughtworks presents XConf Australia, back in-person in three cities, bringing together people who care deeply about software and its impact on the world.

In its fifth year, XConf is our annual technology event created by technologists for technologists.

Participate in a robust agenda of talks as local thought leaders and Thoughtworks technologists share first-hand experiences and exchange new ways to empower teams, deliver quality software and drive innovation for responsible tech.

Explore how at Thoughtworks, we are making tech better, together.

Tickets are now available and all proceeds will be donated to Indigitek, a not-for-profit organisation that aims to create technology employment pathways for First Nations Peoples.

Click the button below to register and get your ticket for the Melbourne, Sydney or Brisbane event



It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.


Share News tips for the iTWire Journalists? Your tip will be anonymous




Guest Opinion

Guest Interviews

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News