APRIL 20258MANUFACTURING TECHNOLOGY INSIGHTS8IN MY OPINIONIn an era marked by increasingly sophisticated cyber threats and a growing reliance on cloud computing and remote work, traditional perimeter-based security models are proving inadequate to safeguard sensitive data and critical assets. As a result, organizations are adopting an approach based on behavioral trust.THE CONCEPT OF ZERO TRUST ARCHITECTUREZero Trust Architecture (ZTA) inverts the assumption that we are familiarized with in courts of law, by assuming that everyone is bad until they prove that they are not! And we must keep proving it along the way! This is valid whether a user or device is inside or outside the corporate network perimeter. For this, ZTA promotes continuous authentication, least privilege access controls, and micro-segmentation to enforce strict access controls and limit lateral movement within the network. This approach is particularly critical in today's distributed computing environments, where employees access corporate resources from a variety of devices and locations.KEY PRINCIPLES OF ZERO TRUST ARCHITECTURE1. Identity Verification: Authentication and authorization mechanisms are enforced to verify identity not only of users but also of devices and applications requesting access to resources. This act often involves multi-factor authentication (MFA), biometric authentication and identity federation to ensure that only authorized entities are allowed.2. Least Privilege Access: In this approach, access privileges are granted on a need-to-know basis, with users and devices only given access to the specific resources required to perform their tasks. By minimizing access rights, organizations can mitigate the risk of insider threats and limit the potential damage caused by compromised accounts. Always keep in mind the user and device combination can dictate different levels of access. For instance, the user on a mobile device, may not have the same level that the same user on a computer.3. Micro-Segmentation: While the trend is to apply it mostly on legacy and on-prem resource access needs, ZTA advocates for the segmentation of network resources into smaller, isolated segments or zones, each with its own access controls and security policies. This limits the lateral movement of threats within the network and contains breaches to specific segments, minimizing their impact. Some pieces of software, aka Zero Trust Client, may enforce it even at the client level, restricting DNS and routing rules.THE RISE OF ZERO TRUST ARCHITECTURE IN MODERN IT INFRASTRUCTUREBy Jose Jorge Santos, Director of IT Infrastructure and Operations, Salvador Caetano GroupJose Jorge Santos
<
Page 7 |
Page 9 >