Santa and the Zero-Trust Model: A Christmas Story

Santa and the Zero-Trust Model: A Christmas Story
How would the world's most generous elf operate in a world of zero-trust security? A group of cybersecurity experts lets us know.
(image by olly, via Adobe Stock)

On Christmas Eve, snow will fall, Yule logs will blaze, visions of sugarplums will dance in children's heads, and in the eyes of zero-trust experts, countless security breaches will happen in homes around the world.


Zero-trust security has blanketed IT like the snow Bing Crosby sang about. Based on the idea of maintaining strict access controls and not trusting anyone or any component by default — even those already inside the network perimeter — zero trust seeks to prevent intrusion wherever possible and minimize the damage from intrusions that do occur.


Each Christmas Eve, though, a party we've never met and know only by reputation enters our homes and leaves packages. The question Dark Reading put to security experts is whether this "Santa Claus" can be made compliant with the requirements of zero-trust security — or whether modern security might mean the end of children's dreams.


"For far too many years, we’ve given carte blanche to Santa Claus to ignore basic security best practices —— not to mention safety issues bringing potential carcinogens with him down the chimney," says Willy Leichter, vice president at Virsec. "Simply saying we 'trust' the big guy is dangerous and naïve."


"Santa's visit has been invited, typically, by one of the junior members of the household. This junior staffer is likely to have also given Santa a list of items that can ..

Support the originator by clicking the read the rest link below.