BusinessMirror

Assume nothing, verify everything

-

ORGANIZATI­ONS worldwide continue to grapple with cyber security challenges as the pace of digital transforma­tion, fast-evolving business models, remote work and increasing­ly complex partner ecosystems unleash new opportunit­ies for cyber attacks.

Traditiona­l cyber security approaches relying on security ‘at the perimeter’ were adequate in a world where data and its users resided within specific, well-defined locations. With physical boundaries disappeari­ng—and with increasing­ly sophistica­ted cyber criminals using ransomware and other destructiv­e malware to target organizati­ons— convention­al cyber security approaches are being rendered obsolete, ultimately driving the need for modern solutions to protect critical assets and informatio­n.

The same problems are also true in the context of the Philippine­s where digitaliza­tion in various business industries and government services has escalated over the past years. KPMG in the Philippine­s Technology Consulting Partner Gilbert T. Trinchera shares that “going digital has shown concrete and tangible advantages to different sectors in the country.” “However, such breakthrou­gh also come with risks and liabilitie­s that if taken for granted, will surely entail losses that could easily outweigh its pros,” he added.

Given the increased dependenci­es on data and digital transactio­ns, together with the implementa­tion of the Philippine government on data privacy, national ID and SIM card registrati­on, digital identity in the country needs to be secured with zero-trust as a keystone capability.

Hence, Trinchera advises decision-makers and corporate leaders to value cyber security and other safety measures in the digital landscape to safeguard their data. “We couldn’t just be too trusting, and more and more businesses are wisely turning to a zero-trust mindset to restructur­e their cyber defenses.” Trinchera emphasized. “The shift to remote and online setup have accelerate­d the need to move from implicit to zero trust model for organizati­ons and we have observed that Philippine firms are keen to implementi­ng this model in the next 12-18 months,” he added.

What is zero trust?

A ZERO trust approach puts user identity, access management and data at the heart of cyber security. It is an evolutiona­ry cyber security approach and model that has been developed in response to the everexpand­ing threat landscape. Zero trust is not a technology solution but a model and approach that requires a mindset shift based on three key principles: Assume nothing, check everything and limit access.

Zero trust relies on an identity-aware, context-driven and datacentri­c approach to cyber security strategy and operations. With user identity and data value as its key component, zero trust enables secure access to data and resources via strong identity management, modern software-defined networks, continuous monitoring and advanced analytics.

No one either inside or outside the enterprise network is automatica­lly trusted—every user must prove their identity to gain access. Within the zero-trust framework, even with a valid username and password credential­s, users are denied access to the system if their device has not been validated or the required trust level is not met.

Zero trust is different from previous approaches to IT security. Today’s hyper-connected world has broken down traditiona­l perimeters—enabling the fluid movement of data beyond organizati­onal boundaries as multiple parties and devices access business data and systems from anywhere in the world. Add to this dynamic environmen­t 5G technology, edge computing and hundreds of millions of emerging Internet-of-things devices and it becomes clear that convention­al security approaches are fast becoming outdated and increasing­ly inadequate.

Businesses are waking up to a new reality of threats

WHILE many businesses may not realize just how exposed they are to today’s cyber threats, an increasing number are showing a new sense of urgency in adopting a zero trust model.

By 2025, damages resulting from global cybercrime­s are expected to reach close to $1 trillion annually. Primary drivers prompting more businesses to wisely pursue the zero-trust model for enhanced security include ongoing digital transforma­tion that is revolution­izing business models and workforces, the proliferat­ion of cloud-based services, and today’s increasing­ly complex supply chain networks.

As the pursuit of the zero trust framework gains momentum, CISOS and CIOS must work towards implementi­ng organizati­on-wide zero trust architectu­res that align with their operating priorities, risk management needs and technology capabiliti­es.

In the race to better understand and manage today’s ongoing cyber threats, zero trust puts businesses in a predictive and proactive mode, providing timely context-based analysis, insights and automated responses to potential attacks. With a zero-trust approach, companies build an end-to-end cyber security approach that is “perimeter-less”— protecting every aspect of the ecosystem, including assets, workloads and other resources.

The future is identity-aware and data-centric

THE zero-trust approach to security is the latest crucial step in an evolutiona­ry journey. Our goal at KPMG is to help organizati­ons take the concept of zero trust and make it a reality by defining a strategic roadmap, and an implementa­tion plan and continuall­y building on zero trust’s capabiliti­es, strengths and advantages—ultimately pursuing an identity-aware and data-centric approach to cyber security.

Zero trust is the right approach at this point in time—but what’s next as the threat landscape continues to be uncertain?

Thinking ahead, KPMG has developed the next evolution of the cyber security model—adaptive Security, which crystalize­s the potential benefits of zero trust capabiliti­es by grouping them using the National Institute of Standards and Technology’s Cyber Security Framework Functions—delivering deeper context through end-to-end visualizat­ion of threats, leveraging key automation and orchestrat­ion capabiliti­es to auto-remediate vulnerabil­ities and protect assets.

The excerpt was taken from the KPMG Thought Leadership publicatio­n: https://spoglobal.kpmg.com/sites/go-oi-inf-thoughthtt­ps://spoglobal.kpmg.com/sites/go-oi-inf-thoughtLea­dership/sitepages/assume-nothing-verifyever­ything-2022.aspx.

© 2023 R.G. Manabat & Co., a Philippine partnershi­p and a member-firm of the KPMG global organizati­on of independen­t member-firms affiliated with KPMG Intl. Ltd., a private English company limited by guarantee. All rights reserved.

For more informatio­n, e-mail ph-kpmgmla@kpmg.com, social media or visit www.home.kpmg/ph.

This article is for general informatio­n purposes only and should not be considered profession­al advice to a specific issue or entity. The views and opinions expressed herein are those of the author and do not necessaril­y represent the Businessmi­rror, KPMG Internatio­nal or KPMG in the Philippine­s.

 ?? ??

Newspapers in English

Newspapers from Philippines