How COVID-19 made the Zero Trust model the right approach to modernise networks

The COVID-19 pandemic is likely to go down in history as one of the defining moments of our lifetime. From a business perspective, it transformed business models, changed customer expectations, and disrupted the networks that run businesses. These changes are long lasting and accelerated the digital transformation journey, a journey that is now driven by cybersecurity impacts and needs.


 


It’s no secret that the shift to remote working at the start of the pandemic presented challenges for security professionals who were tasked with quickly mobilizing their new remote workforce and securing the network in this new environment. In this new style of working, the Zero Trust approach to network security was commonly touted as a best practice, and rightfully so. The very premise of Zero Trust is to trust no one or no thing – not even your own network – and verify that any attempt to access the network is legitimate and from an authenticated source.


 


As workforces dispersed due to the pandemic, the principles of a Zero Trust architecture naturally came into their own; namely: knowing users, services and data and their associated identities; assessing the behaviour of users and the health of devices and services; using policies to authorise requests and control access; authentication and authorisation of everything; and monitoring users, devices, and services.


 


Operational requirements and ways Zero Trust addressed them 


 


The practices for a Zero Trust network mean specific rules are in place to govern access rights that are granted to specific users and are based upon the user’s job function, location, and other pre-defined variables. Without the ability to physically verify employees as they connect to the network remotely, these protocols came into their own as the most secure wa ..

Support the originator by clicking the read the rest link below.