News

Why network-based zero trust doesn’t protect your most valuable assets

  • Eric Bednash--www.securitymagazine.com
  • published date: 2021-11-22 00:00:00 UTC

None

<div class="body gsd-paywall article-body"> <p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">The state of cybersecurity was vastly different when the zero trust model was </span><a href="https://www.forrester.com/blogs/a-look-back-at-zero-trust-never-trust-always-verify/" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt; color: #4a6ee0;" target="_blank"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt; color: #4a6ee0;">first developed</span></a><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"> by Forrester’s John Kindervag in 2009. After all, that was nearly 13 years ago — Barack Obama had just started his second presidential term, Tom Brady only held three Super Bowl victories to his name, and the H1N1 swine flu was the closest thing to a pandemic our society had experienced. </span></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">Needless to say, </span><em style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">a lot </span></em><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">has changed since then. </span></p> <div id="div-gpt-ad-article-body-sky-mobile" class="advertisement"></div> <p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">The same can be said for </span><a href="https://www.ten-inc.com/presentations/Norse_Need_for_Live_Intelligence-based_Security.pdf" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt; color: #4a6ee0;" target="_blank"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt; color: #4a6ee0;">the cyber threat landscape</span></a><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">. Over the last decade, the rise of mainstream digital adoption, cloud migration, mobile computing and the continued exponential growth of unstructured data has left enterprise networks exceedingly complex to secure and, as a result, increasingly vulnerable to attacks. Once reliable first-generation IT security solutions like firewalls, intrusion detection and endpoint security software were ill-equipped to defend against the omnipresent and ever-evolving nature of malicious insiders, ransomware extortionists, cybercriminal hacktivists and state-sponsored attackers — all of whom are now more skilled, sophisticated and well-funded than ever before. </span></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">Aligning our cyber defense models with an evolving threat landscape is a real and imminent need across the cybersecurity community. With the current state of zero trust, legacy models like two-factor authentication, ZTNA, and other network-based approaches fail to protect unstructured data, which is often the primary asset threat actors are after. Making measurable strides toward fostering a safer cyber future will require a transformational shift to data-centric zero trust that better secures the unstructured data highly sought after by cybercriminals. </span></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><strong style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">The Problem with Perimeter Protection </span></strong></p> <div id="div-gpt-ad-sidebar-sky-mobile" class="advertisement"></div> <p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">Perimeter protection is a key component of network-based zero trust, but it doesn’t address the real vulnerabilities that exist today. For a deeper understanding, envision an organization’s network architecture like an onion with its data assets sitting at the core. By operating with network-based zero trust principles, an organization is essentially relying on the onion’s external layers for protection without real-time visibility into the state of the core inside of it. In addition, they are assuming malicious actors and non-malicious actors are differentiable by their characteristics and credentials alone — when in reality, only behaviors can indicate their true intentions. </span></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">Each time a layer is peeled by an internal actor — regardless of whether it’s a harmful attacker or harmless employee — the lack of IT visibility prohibits the organization from assessing the actor’s behaviors to determine the nature of the compromise </span><em style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">before</span></em><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"> the core data assets are infiltrated. This inability to understand the scope of the threat and mitigate its impact is a driving factor of our global cyber crisis, and it’s the reason we’re stuck in this position, to begin with. </span></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><strong style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">The Case for Data-Centric Zero Trust </span></strong></p> <div id="div-gpt-ad-sidebar-mrect-mobile" class="advertisement"></div> <p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">A data-centric zero-trust approach offers a proven alternative to the clear issues of legacy network-based principles. Its framework is built around the use of advanced data security solutions that generate real-time visibility to better protect data at the core; adopting an inside-out version of the “trust no one, verify everything” viewpoint at the foundation of zero trust. </span></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">Data-centric zero trust solutions can come in various forms and fashions, but one of the most interesting and effective from an enterprise perspective is cyber storage solutions. They leverage artificial intelligence and machine learning to converge heightened cyber storage functionality with zero trust security principles, which enable organizations to consistently monitor the behaviors of internal actors in any environment from a data perspective. As a result, they can pinpoint the exact moment a zero trust compromise becomes a significant threat putting their data assets at risk —  and then actively mount a quick and agile response to reduce damage at the core where their data assets are stored. The actionable real-time insights generated by this type of solution empower defenders to improve the state of their entire cybersecurity posture and adjust to the evolving nature of attacks. </span></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><br></p><p style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;"><span data-preserver-spaces="true" style="color: rgb(14, 16, 26); margin-top:0pt; margin-bottom:0pt;">The meteoric rise of cyberattacks in 2021 was a byproduct of legacy mindsets and outdated practices that fail to align with the current threat landscape. It’s time we take action to change that. By shifting to data-centric zero trust with innovative solutions that integrate enhanced levels of control to data security, organizations can boost their ability to prevent breaches, defend against attacks, and combat increasingly sophisticated cybercriminal enterprises. </span></p></div>