Embracing Digital Transformation

#172 Zero Trust Architecture


Listen Later

In this podcast episode Darren talks with Steve Orrin and Dave Marcus and discusses zero trust architecture, a new security model needed for today's digital environments where the network perimeter is disappearing. Experts explain what zero trust is, key principles like default deny access and continuous authentication, and advice for organizations starting their zero trust journey.

Digital transformation initiatives aim to leverage new technologies to improve business processes and deliver better experiences for customers and employees. However, as organizations extend their networks and adopt cloud services, the traditional security model of trusted networks is no longer sufficient. This creates vulnerabilities that cybercriminals can exploit.


Zero trust architecture provides a framework to enhance security in today's complex environments. But what exactly is zero trust, and how can organizations start their journey towards implementing it?


 Factors Driving Zero Trust Architecture


At its core, zero trust architecture is about applying continuous, granular policies to assets and resources when users or entities attempt to access or interact with them. This policy gets applied regardless of the location - on premise, cloud, hybrid environments, etc. The key principles are:


* Default deny - Access is denied by default. Users must authenticate and be authorized for the specific context.


* Continuous authentication - Users are re-authenticated and re-authorized throughout their sessions based on analytics of identity, time, device health, etc.


* Microsegmentation - Fine-grained controls are applied for lateral movement between assets and resources.


This differs from traditional network security that uses implied trust based on whether something is inside the network perimeter.


 Getting Started with Zero Trust


Implementing zero trust is a continuous journey, not a one-time project. However, organizations need to start somewhere. Here are a few best practices:


* Educate yourself on zero trust frameworks and concepts


* Map out a workflow for a medium-risk application and identify dependencies


* Leverage existing infrastructure - microsegmentation, encryption, visibility tools


* Obtain executive buy-in and involve business stakeholders


* Start with a solid cybersecurity foundation - hardware roots of trust, encryption, asset inventory


* Increase visibility into the operational environment and supply chain


While zero trust may require new investments in technology and process changes over time, organizations can make significant progress by refining how they use what they already have.


 Looking Ahead


As business applications and resources continue migrating outside the traditional network perimeter, zero trust allows a more dynamic and contextual approach to security. Instead of blanket allowances based on location, granular controls are applied according to the specific access requirements.


This journey requires vigilance - policies must adapt as business needs evolve, and new risks emerge. But with the right vision and commitment, zero trust architecture provides a path forward to enable digital innovation and resilience.

...more
View all episodesView all episodes
Download on the App Store

Embracing Digital TransformationBy Dr. Darren Pulsipher

  • 4.4
  • 4.4
  • 4.4
  • 4.4
  • 4.4

4.4

15 ratings


More shows like Embracing Digital Transformation

View all
EconTalk by Russ Roberts

EconTalk

4,279 Listeners

WSJ Tech News Briefing by The Wall Street Journal

WSJ Tech News Briefing

1,657 Listeners

Today, Explained by Vox

Today, Explained

10,281 Listeners

The Bulwark Podcast by The Bulwark

The Bulwark Podcast

12,577 Listeners

Hard Fork by The New York Times

Hard Fork

5,537 Listeners

Notes to My Legal Self® by Olga V. Mack

Notes to My Legal Self®

40 Listeners

The Ezra Klein Show by New York Times Opinion

The Ezra Klein Show

16,221 Listeners

Deep Transformation by Roger Walsh and John Dupuy

Deep Transformation

81 Listeners

Echoes Through Eternity with Dr. Jeffery Skinner by Dr. Jeffery D Skinner

Echoes Through Eternity with Dr. Jeffery Skinner

3 Listeners

Prof G Markets by Vox Media Podcast Network

Prof G Markets

1,449 Listeners

Daring Creativity. Daring Forever. by Radim Malinic

Daring Creativity. Daring Forever.

14 Listeners

Different, not broken by Lauren "L2" Howard

Different, not broken

20 Listeners

Bubba the Love Sponge® Show by Podcast Playground

Bubba the Love Sponge® Show

7 Listeners