Why Zero Trust Security Is Not Enough To Prevent Data Breaches
The concept of “zero trust” security has been around for decades but has only recently become popular. A report from Microsoft found that 90% of surveyed company security decision-makers were now familiar with zero trust security, compared to only 70% the previous year.
However, adopting the zero trust security concept is still challenging because organizations need to rethink their identity management solutions. But before we understand why consolidating identity management is so vital to companies, we need to understand the basics of zero trust security.
What Is Zero Trust Security?
What Is Zero Trust Security?
Zero trust security is a framework requiring all users to be properly authenticated, authorized and continuously validated to access applications and data. The central concept is zero trust, verify everything.
Zero trust security also assumes there is no edge to the network. Networks can be local, cloud-based or a combination of both, with workers in any location.
Why Do Companies Want Zero Trust Security?
The primary reason zero trust security’s popularity has surged is the transformation of how we work. Remote and work-from-home workers have become the new norm after COVID shut down offices around the globe. Many businesses are now more reliant on cloud computing to allow their employees access to company data.
The other reason businesses are more interested in zero trust security is the rise in cybercrime. Companies must now face the challenge of protecting their data and distinguishing remote employees from cyber threats.
Why Do Companies Want Zero Trust Security?
The primary reason zero trust security’s popularity has surged is the transformation of how we work. Remote and work-from-home workers have become the new norm after COVID shut down offices around the globe. Many businesses are now more reliant on cloud computing to allow their employees access to company data.
The other reason businesses are more interested in zero trust security is the rise in cybercrime. Companies must now face the challenge of protecting their data and distinguishing remote employees from cyber threats.
How Does Zero Trust Security Work?
Companies must set up a “protect surface” which is made up of its most secure data, applications, assets, and services. The company then sets up a micro perimeter surrounding the protect surface and requires users to authenticate themselves whenever they cross it to access sensitive information. The barrier set up is a zero trust barrier, requiring everyone to prove who they are through biometrics or two-factor authentication. This idea of business processes, technologies, and policies that allow the management of digital identities is called identity and access management (IAM), and is a cornerstone of zero trust security.
How Does Zero Trust Security Work?
Companies must set up a “protect surface” which is made up of its most secure data, applications, assets, and services. The company then sets up a micro perimeter surrounding the protect surface and requires users to authenticate themselves whenever they cross it to access sensitive information. The barrier set up is a zero trust barrier, requiring everyone to prove who they are through biometrics or two-factor authentication. This idea of business processes, technologies, and policies that allow the management of digital identities is called identity and access management (IAM), and is a cornerstone of zero trust security.
How Identity Management Fits In
Many companies have complex digital identity structures that use a combination of legacy systems. One tool is for provisioning and deprovisioning, another for multi-factor authentication (MFA), one for single sign-on, and yet another for fast smart-card enabled access.
How Identity Management Fits In
Many companies have complex digital identity structures that use a combination of legacy systems. One tool is for provisioning and deprovisioning, another for multi-factor authentication (MFA), one for single sign-on, and yet another for fast smart-card enabled access.
The Solution Is Consolidation
Organizations should be working toward consolidating the systems mentioned above. Consolidating identity management reduces the size of the surfaces vulnerable to an attack because there is one point of entry. Their goal should be a decentralized identity structure that allows different organizational systems to retrace their steps to a single user more accurately.
A decentralized identity structure system would automatically perform provision, deprovision, modify access rights and make reports on all users in the system. Additionally, bulletproof policies, access rules and current MFA methods would protect the system much better.
Not very long ago, only highly secure government agencies and industries used the security measures we now take for granted. Everything now uses biometrics, from banking to unlocking a laptop to opening an office door with an RFID card.
Ironically, all this extra security has become a problem. As more security identities are created, the more likely an ID will be used for a breach. It increases the size of a company’s vulnerability to an attack.
The Solution Is Consolidation
Organizations should be working toward consolidating the systems mentioned above. Consolidating identity management reduces the size of the surfaces vulnerable to an attack because there is one point of entry. Their goal should be a decentralized identity structure that allows different organizational systems to retrace their steps to a single user more accurately.
A decentralized identity structure system would automatically perform provision, deprovision, modify access rights and make reports on all users in the system. Additionally, bulletproof policies, access rules and current MFA methods would protect the system much better.
Not very long ago, only highly secure government agencies and industries used the security measures we now take for granted. Everything now uses biometrics, from banking to unlocking a laptop to opening an office door with an RFID card.
Ironically, all this extra security has become a problem. As more security identities are created, the more likely an ID will be used for a breach. It increases the size of a company’s vulnerability to an attack.
A Real-life Problem Consolidated Identity Management Could Have Solved
Take the Colonial Pipeline cyberattack, for example, where hackers breached the security of the largest pipeline in the U.S. using a single compromised password. Authorities traced the hack back to an employee’s VPN, which was active but no longer in use. The employee had used the same password for multiple sites. In an unrelated data breach, the password was stolen and sold on the dark web. The Colonial Pipeline hackers used that password to breach the systems and wreak havoc on the pipeline, causing the entire pipeline to shut down temporarily.
Unfortunately, the hacked VPN account inside Colonial Pipeline Co. did not use MFA, zero trust security or any other consolidated identity management systems. This whole situation — and the $5 million ransom that was paid — could have been avoided.
A Real-life Problem Consolidated Identity Management Could Have Solved
Take the Colonial Pipeline cyberattack, for example, where hackers breached the security of the largest pipeline in the U.S. using a single compromised password. Authorities traced the hack back to an employee’s VPN, which was active but no longer in use. The employee had used the same password for multiple sites. In an unrelated data breach, the password was stolen and sold on the dark web. The Colonial Pipeline hackers used that password to breach the systems and wreak havoc on the pipeline, causing the entire pipeline to shut down temporarily.
Unfortunately, the hacked VPN account inside Colonial Pipeline Co. did not use MFA, zero trust security or any other consolidated identity management systems. This whole situation — and the $5 million ransom that was paid — could have been avoided.
Conclusion
Digital cyber attacks like the Colonial Pipeline will continue as long as the hackers can get in through unsecure entry points. Organizations are facing the increasingly difficult task of keeping their data safe. Yet, they also need to allow their sensitive business documents to be accessible to more and more remote workers.
Furthermore, companies face massive challenges around digital identities. The priority should be securing data, systems, and users in the interim. However, the case for establishing a more effective digital identity model is gaining traction.
Conclusion
Digital cyber attacks like the Colonial Pipeline will continue as long as the hackers can get in through unsecure entry points. Organizations are facing the increasingly difficult task of keeping their data safe. Yet, they also need to allow their sensitive business documents to be accessible to more and more remote workers.
Furthermore, companies face massive challenges around digital identities. The priority should be securing data, systems, and users in the interim. However, the case for establishing a more effective digital identity model is gaining traction.
A proper digital identity paradigm for organizations would include:
- A holistic solution for governing and managing digital identities
- The ability to manage identity governance
- Authentication assurance
- Zero trust security
- Proofing
Ideally, passwordless and straightforward user access and authentication with a consolidated identity management system should be most businesses’ online network security goals.
A proper digital identity paradigm for organizations would include:
- A holistic solution for governing and managing digital identities
- The ability to manage identity governance
- Authentication assurance
- Zero trust security
- Proofing
Ideally, passwordless and straightforward user access and authentication with a consolidated identity management system should be most businesses’ online network security goals.
Share This Story, Choose Your Platform!
Let’s have a 15-minute video call
We are now taking on new clients.