Artwork

Dr. Darren Pulsipher에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Dr. Darren Pulsipher 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.
Player FM -팟 캐스트 앱
Player FM 앱으로 오프라인으로 전환하세요!

#172 Zero Trust Architecture

34:55
 
공유
 

Manage episode 382889010 series 3270518
Dr. Darren Pulsipher에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Dr. Darren Pulsipher 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

In this podcast episode Darren talks with Steve Orrin and Dave Marcus and discusses zero trust architecture, a new security model needed for today's digital environments where the network perimeter is disappearing. Experts explain what zero trust is, key principles like default deny access and continuous authentication, and advice for organizations starting their zero trust journey.

Digital transformation initiatives aim to leverage new technologies to improve business processes and deliver better experiences for customers and employees. However, as organizations extend their networks and adopt cloud services, the traditional security model of trusted networks is no longer sufficient. This creates vulnerabilities that cybercriminals can exploit.

Zero trust architecture provides a framework to enhance security in today's complex environments. But what exactly is zero trust, and how can organizations start their journey towards implementing it?

Factors Driving Zero Trust Architecture

At its core, zero trust architecture is about applying continuous, granular policies to assets and resources when users or entities attempt to access or interact with them. This policy gets applied regardless of the location - on premise, cloud, hybrid environments, etc. The key principles are:

* Default deny - Access is denied by default. Users must authenticate and be authorized for the specific context.

* Continuous authentication - Users are re-authenticated and re-authorized throughout their sessions based on analytics of identity, time, device health, etc.

* Microsegmentation - Fine-grained controls are applied for lateral movement between assets and resources.

This differs from traditional network security that uses implied trust based on whether something is inside the network perimeter.

Getting Started with Zero Trust

Implementing zero trust is a continuous journey, not a one-time project. However, organizations need to start somewhere. Here are a few best practices:

* Educate yourself on zero trust frameworks and concepts

* Map out a workflow for a medium-risk application and identify dependencies

* Leverage existing infrastructure - microsegmentation, encryption, visibility tools

* Obtain executive buy-in and involve business stakeholders

* Start with a solid cybersecurity foundation - hardware roots of trust, encryption, asset inventory

* Increase visibility into the operational environment and supply chain

While zero trust may require new investments in technology and process changes over time, organizations can make significant progress by refining how they use what they already have.

Looking Ahead

As business applications and resources continue migrating outside the traditional network perimeter, zero trust allows a more dynamic and contextual approach to security. Instead of blanket allowances based on location, granular controls are applied according to the specific access requirements.

This journey requires vigilance - policies must adapt as business needs evolve, and new risks emerge. But with the right vision and commitment, zero trust architecture provides a path forward to enable digital innovation and resilience.

  continue reading

298 에피소드

Artwork
icon공유
 
Manage episode 382889010 series 3270518
Dr. Darren Pulsipher에서 제공하는 콘텐츠입니다. 에피소드, 그래픽, 팟캐스트 설명을 포함한 모든 팟캐스트 콘텐츠는 Dr. Darren Pulsipher 또는 해당 팟캐스트 플랫폼 파트너가 직접 업로드하고 제공합니다. 누군가가 귀하의 허락 없이 귀하의 저작물을 사용하고 있다고 생각되는 경우 여기에 설명된 절차를 따르실 수 있습니다 https://ko.player.fm/legal.

In this podcast episode Darren talks with Steve Orrin and Dave Marcus and discusses zero trust architecture, a new security model needed for today's digital environments where the network perimeter is disappearing. Experts explain what zero trust is, key principles like default deny access and continuous authentication, and advice for organizations starting their zero trust journey.

Digital transformation initiatives aim to leverage new technologies to improve business processes and deliver better experiences for customers and employees. However, as organizations extend their networks and adopt cloud services, the traditional security model of trusted networks is no longer sufficient. This creates vulnerabilities that cybercriminals can exploit.

Zero trust architecture provides a framework to enhance security in today's complex environments. But what exactly is zero trust, and how can organizations start their journey towards implementing it?

Factors Driving Zero Trust Architecture

At its core, zero trust architecture is about applying continuous, granular policies to assets and resources when users or entities attempt to access or interact with them. This policy gets applied regardless of the location - on premise, cloud, hybrid environments, etc. The key principles are:

* Default deny - Access is denied by default. Users must authenticate and be authorized for the specific context.

* Continuous authentication - Users are re-authenticated and re-authorized throughout their sessions based on analytics of identity, time, device health, etc.

* Microsegmentation - Fine-grained controls are applied for lateral movement between assets and resources.

This differs from traditional network security that uses implied trust based on whether something is inside the network perimeter.

Getting Started with Zero Trust

Implementing zero trust is a continuous journey, not a one-time project. However, organizations need to start somewhere. Here are a few best practices:

* Educate yourself on zero trust frameworks and concepts

* Map out a workflow for a medium-risk application and identify dependencies

* Leverage existing infrastructure - microsegmentation, encryption, visibility tools

* Obtain executive buy-in and involve business stakeholders

* Start with a solid cybersecurity foundation - hardware roots of trust, encryption, asset inventory

* Increase visibility into the operational environment and supply chain

While zero trust may require new investments in technology and process changes over time, organizations can make significant progress by refining how they use what they already have.

Looking Ahead

As business applications and resources continue migrating outside the traditional network perimeter, zero trust allows a more dynamic and contextual approach to security. Instead of blanket allowances based on location, granular controls are applied according to the specific access requirements.

This journey requires vigilance - policies must adapt as business needs evolve, and new risks emerge. But with the right vision and commitment, zero trust architecture provides a path forward to enable digital innovation and resilience.

  continue reading

298 에피소드

모든 에피소드

×
 
Loading …

플레이어 FM에 오신것을 환영합니다!

플레이어 FM은 웹에서 고품질 팟캐스트를 검색하여 지금 바로 즐길 수 있도록 합니다. 최고의 팟캐스트 앱이며 Android, iPhone 및 웹에서도 작동합니다. 장치 간 구독 동기화를 위해 가입하세요.

 

빠른 참조 가이드

탐색하는 동안 이 프로그램을 들어보세요.
재생