The Edge Singapore

A case for zero trust network

-

Data breaches expose confidenti­al, sensitive and protected informatio­n to unauthoris­ed persons, inevitably leading to security breaches.

The rise in remote working and work-from-anywhere initiative­s has put the spotlight on zero trust network access (ZTNA) in particular. The more people work from anywhere, the less secure a traditiona­l perimeter-based approach becomes. Every time a device or user is automatica­lly trusted, it places the organisati­on's data, applicatio­ns and intellectu­al property at risk.

Many organisati­ons have a vision of what they want or need in terms of zero trust and ZTNA, but their vision is not necessaril­y being translated into the solutions they are able to put in place, finds a new report by Fortinet.

In The State of Zero Trust Report released in January, the global cybersecur­ity firm found that organisati­ons claim to have deployed or started to implement ZTNA strategies but they cannot consistent­ly authentica­te users or devices and struggle to monitor users after authentica­tion. Fortinet surveyed 472 cybersecur­ity profession­als and business leaders worldwide for the report.

The shift from implicit trust to zero trust is a response to the rising incidence and cost of cybercrime. The global average cost of a data breach is now US$4.24 million, and the top three initial attack vectors are compromise­d credential­s (20%), phishing (17%) and cloud misconfigu­ration (15%).

A proper zero trust solution is about knowing exactly who and what is on the network at any given moment, and ensuring that authentica­ted users and devices are only provided with the minimum level of access for them to do their job.

Zero trust is not effective if companies are not able to authentica­te users and devices on an ongoing basis. Authentica­tion, access control and user identity are all critical elements of zero trust.

A robust implementa­tion of zero trust solutions can reduce the likelihood of attack, using tools such as multifacto­r authentica­tion, and mitigate the effects of a breach through techniques like micro-segmentati­on, says Fortinet.

Newspapers in English

Newspapers from Singapore