Is The Digital Perimeter Really Disappearing? Rethinking the IT Borders

Is The Digital Perimeter Really Disappearing? Rethinking the IT Borders


Is the digital perimeter disappearing as cybersecurity experts claim? What should the borders of your IT environment look like now with evolving technology and remote workforces? How does identity and access management (IAM) affect the digital perimeter, and what does it look like now? 


Usually, experts describe the digital perimeter of business networks in the same manner as a castle. There are high walls and a moat and drawbridge, and hackers (represented as invading armies) fling themselves in vain at these defenses. Only those who can show proper credentials can lower the drawbridge and enjoy the castle’s amenities and services. 


However, this model doesn’t quite hold up to the reality of evolving hacker tactics in the modern age. Hackers have found new ways to break through the digital perimeter, whether by finding holes in the wall (new attack vectors), leaping over the walls (bypassing logins), or compromising endpoints and passwords (dressing up as trusted people). 


Naturally, some authors claim that the digital perimeter is no more, and that identity and access management represents the next step. But is it really so different? 


The Digital Perimeter and Identity Management


Zero Trust


Never trust, always verify. These words form the foundation of Zero Trust architecture and security philosophy. Even if a known user logs in in perfectly on the first try, that does not mean your network should trust them. 


So Zero Trust operates by asking for verification for every new resource, database, and application a user requests. This can ..

Support the originator by clicking the read the rest link below.