sb-as logo
Story image

Demystifying 'zero trust' and its role in cybersecurity

18 Jan 2021

The principle of ‘zero trust’ in cybersecurity is simple: Trust nothing, and verify everything.

What this means is that organisations should protect all of their resources, no matter where they reside and ensure that every network connection is, by default, untrusted.

This principle is especially important now that the traditional network perimeter for most organisations has dramatically changed.  The corporate network has expanded to include cloud platforms, applications and data while an increasing number of employees are working remotely.  Every person connecting to important applications and data must be scrutinised and treated with caution. 

Of course, trust must be established for these connections to work as intended, but the key to zero trust is that those connections are constantly re-evaluated to protect them from internal and external threats.

Zero trust runs on an assumption that people are acting on these threats and trying to attack an organisation all the time.  Every connection, user, and device must be authenticated before it tries to make a connection.

And of course, zero trust should be dynamic, acting in real time and drawing on as many data sources as possible to make the best decisions. According to cybersecurity firm Sophos, static security policies don’t offer protection if a device has been compromised while the user is still on it.

How does zero trust work? The four core elements

Sophos’ Demystifying Zero Trust white paper breaks down the four core elements of zero trust.

Always identify: Choose a single identity source that can be used with Single Sign On (SSO) and multi-factor authentication for the strongest identity verification possible.

Always control: Deploy controls and checks where they are needed most, and mandate the principle of least privilege, i.e. only provide users the access they need to do their jobs.

Always analyse: Investigate authentications to make sure they can be trusted, because sometimes attackers can use valid credentials to access systems.  Authentication should be monitored with a combination of security tools such as security information and event management (SIEM) and endpoint detection and response (EDR).

Always secure: Think of cybersecurity from the ‘inside out’. That is, find important data within the organisation and work outwards, scanning for vulnerabilities along the way.

How Sophos can help

Sophos built its cloud-native cybersecurity platform Sophos Central with a focus on helping organisations to adopt and manage a zero-trust environment.

The platform integrates a range of Sophos technologies that enable a zero-trust network.

These include Sophos Zero Trust Network Access (ZTNA), a new product being introduced for early access this quarter to securely connect authorised users and devices to important corporate applications
and data.

It works seamlessly alongside Sophos Intercept X endpoint protection, which guards against breaches and the latest threats. Sophos Cloud Optix and XG Firewall also play an important role in securing public cloud, data, devices, networks, and workloads.

Learn more in Sophos’ Demystifying Zero Trust report here.

Story image
SASE vs zero trust – or the best of both worlds
Zero trust and SASE work together by converging a least-privilege access strategy with an architecture that simplifies how highly distributed users, BYOD, and cloud resources are secured.More
Story image
Cyberattacks on healthcare organisations "out of control" - Check Point
There has been a 45% increase in cyberattacks on healthcare organisations worldwide in the last two months, making healthcare the most targeted industry by cyber criminals.More
Story image
APAC secure content management market to hit $2.2 billion by 2024
The proliferation of cloud-based deployments will largely drive this, the report says, as the COVID-19 pandemic motivates more enterprises to move their workloads to the cloud and rely more on the internet. More
Story image
Kaspersky discovers COVID-19 research related cyber threats
Kaspersky researchers have identified two APT incidents that targeted entities related to COVID-19 research - a Ministry of Health body and a pharmaceutical company. More
Story image
Entrust acquires HyTrust, with aim to improve data encryption solutions
Entrust says the acquisition will bolster its effort to deliver data protection and compliance solutions to its customers, while accelerating their digital transformations.More
Story image
IronNet expands Asia Pacific presence with new strategic partnership
“The combination of M.Tech’s extensive network in Asia Pacific and our unparalleled expertise in threat intelligence and detection will help more enterprises across the region to proactively identify and take down known and unknown threats before they happen.”More