Chris Atkins
Nov 04, 2023

Why Zero-Trust Security is Essential: a Real-World Lesson for Business

Zero-trust security constantly validates access in today's perimeter-less digital landscape, crucial for reputation, finances, and operational continuity for businesses.

Many of us remember the shockwaves that the infamous Target breach sent across the corporate landscape in 2013. It was one of the largest and most consequential breaches in history which occurred after hackers stole 40 million credit and debit cards and compromised the personal details of seventy million customers. Considering all costs, it is estimated that the breach cost Target over $200 million dollars (including an $18 million settlement).

But what's more startling is that the breach was not a direct assault on Target's systems. Instead, hackers first infiltrated a third-party HVAC vendor and leveraged that trusted connection to penetrate Target's network.

Target trusted its connection with its vendors, believing that if someone had access, they must be safe. That misplaced trust had devastating consequences, tarnishing the brand's reputation and leading to significant financial losses. In many ways, Target's defense strategy was analogous to a fortress that focuses on its outer walls but forgets about vetting those who come in and out through its gates.

This incident underscores a critical flaw in the traditional cybersecurity model. By placing most of the emphasis on perimeter defenses, businesses expose themselves to risks from supposedly "trusted" sources, whether they're vendors, employees, or even contractors. To combat such threats, the zero-trust security model emerges, challenging companies to never trust and always verify, regardless of who's making the request or from where.

Unraveling Zero-Trust Security: A Paradigm Shift in Cybersecurity

At its core, the zero-trust security model is encapsulated by a simple principle: "Never trust, always verify." For business and technical leaders, understanding this shift isn't just a technical requirement—it's a strategic imperative. Let's break it down:

Zero Trust treats security as a multi-layered system. Every component in the system has an "identity" which interacts with "endpoints" that can be dynamically partitioned in order to protect the organization's data. The entire system is configured to verify all interactions explicitly, apply least privileged access rules, and "always assume breach."
Sonador AI, Inc

Understanding the Perimeter-less World

In the past, IT security was often visualized as a castle with a moat. Everything inside was trusted, and everything outside was not. Today, with cloud computing, remote work, mobile devices, and IoT (Internet of Things), this perimeter has dissolved. Just as businesses have become more agile and distributed, so have the threats. The line between "inside" and "outside" is blurred, necessitating a fresh approach.

The Essence of Zero Trust

Zero-trust security isn't about never trusting anyone; it's about re-validating trust continuously. It ensures that every user, device, and application request is authenticated and authorized before access is granted, irrespective of its location or relationship with the organization.

The Micro-segmentation Technique

One of the key techniques within zero-trust is micro-segmentation. Instead of having a broad, sweeping defense line, the network is divided into smaller, isolated segments. Even if a malicious actor gains access to one segment, they won't necessarily have access to the others, significantly limiting the potential damage.

Why Leaders Should Care

  • Reputation Management: As seen with Target, a breach can have catastrophic effects on brand image. A solid zero-trust approach can mitigate such risks, ensuring stakeholders that the company is committed to data protection.
  • Financial Implications: Data breaches can result in massive fines, especially with regulations like GDPR (General Data Protection Regulation), CCPA (California Consumer Privacy Act), and HIPAA. Beyond penalties, there are costs associated with damage control, legal fees, and customer compensations.
  • Operational Continuity: Cyber-attacks can disrupt business operations. The ability to quickly identify, contain, and neutralize threats is crucial to ensuring uninterrupted service to clients and stakeholders.
  • Expanded Capabilities: The benefits of zero-trust aren't solely limited to improved security and risk mitigation. They also enable a more flexible workplace where your employees are able to be productive anywhere and allow for complex IT environments with resources spread between the cloud, on-premise, and manufacturing or field sites.

First Steps

Embracing zero-trust security isn't just about adopting new tools. It requires a cultural shift. Organizations need to embed this mindset at every level, from the tech team to the top executives. It involves continuous training, regular audits, and an iterative approach to constantly enhance security measures. It further requires adopting a new mindset: verify explicitly, apply least privileged access, and always assume breach.

  • Verify explicitly: always authenticate and authorize anything connecting to company computing resources. This includes all users, data endpoints, workloads, and devices. Use monitoring to watch for anomalies and restrict access if they are detected.
  • Use least-privilege access: limit user access by ensuring that only have access to the systems they need at any given time and prompting for authorization when executing sensitive operations, apply risk-adaptive policies, and following data-protection best practices.
  • Assume breach: adopt end-to-end encryption and analytics to help get visibility, drive threat detection, improve defenses, and minimize blast radius.

Implementing Zero Trust

The principles of zero-trust can be applied to the technical components of a business to create a multi-layered system for protecting data and enabling employees. There are six important layers to a Zero-trust system.

Identity

Access to a zero-trust system starts with an identity to ensure that only trusted people, devices, and processes are allowed.

Endpoints

The second step comes in assessing and hardening the devices within the system (including Internet of Things) which will access resources and data. Know what devices are on the network and ensure that they are compliant with company policy and legal requirements.

Applications

Securing applications and workloads which run on devices is also part of a comprehensive strategy, whether running in the cloud, on desktop/mobile applications, or custom developed server software.

Network

Ensure that devices and users aren't trusted just because they're on an internal network. Encrpyt all communications, limit access by policy, and apply microsegmentation and real-time threat detection.

Infrastructure

Make use of logging and telemetry to detect, flag, and block risky behavior. Employ least-privilege access principles to ensure that any breach is as tightly contained as possible.

Data

Rather than use perimeter-based data protection, use intelligent systems to classify and label data. Encrypt and restrict access based on organizational policies as part of a comprehensive data governance strategy.

Conclusion

In conclusion, the digital landscape is evolving rapidly, and the threats are evolving with it. For businesses, staying a step ahead isn't just an IT challenge—it's a business survival imperative. Zero-trust security offers a robust framework to navigate this landscape, ensuring that trust is earned, validated, and never taken for granted.

People at work: tops of the mountains
Securely work from anywhere. Using Zero Trust allows employees to securely access resources from anywhere.
Image showing boxes on shelves in a warehouse
Safeguard assets and systems. Zero Trust principles provides a framework to implement safeguards for data as it moves beyond the network and ensures that users can access the information they need to be productive.
People at work: womanintently looking at a computer monitor
Minimize the impact of bad actors. Through the principles of "verify explicitly," "use least access principles," and "assume breach" it is possible to have better visibility into your infrastructure and limit the effect bad actors can have.

Chris Atkins is CTO of Sonador AI, Inc. Sonador provides the medical industry with cutting edge open source tools and experise to drive transformative change and enhance the quality of healthcare worldwide.

Chris Atkins Nov 04, 2023
More Articles by Chris Atkins

Loading

Unable to find related content

Comments

Loading
Unable to retrieve data due to an error
Retry
No results found
Back to All Comments