Intelligent CIO Middle East Issue 55 | Page 9

N — ONE OF THE O TRUST MODEL However, with encryption comes the creation of a “blind spot” in our network defences as most of the security devices we use are not designed to decrypt and inspect traffic. The Zero Trust model is not immune to this problem as visibility is considered as one of the key elements to its successful implementation. Without complete encrypted traffic visibility, the model will fail, introducing vulnerabilities that can be exploited by both insiders and hackers. TLS/SSL Decryption — One of the Main Pillars of Zero Trust A centralized and dedicated decryption solution must be placed at the centre of the Zero Trust model and should be included as one of the essential components of your security strategy. Many security vendors will make claims of the ability to decrypt their own traffic, working independently of a centralized decryption solution. However, this “distributed decryption” approach can introduce problems of its own, including inferior performance and network bottlenecks, and fixing these would require costly upgrades. Key features of a good TLS/ SSL Decryption Solution Below are some of the features to look out for when looking to implement a TLS/ SSL Decryption Solution: • Full Traffic Visibility • Ease of Integration • Multi-Layered Security Services • User Access Control • Micro Segmentation • Securing Cloud Access In conclusion, without a centralized and dedicated TLS/SSL decryption solution, the Zero Trust model is unable to do what it was designed to do — protect our networks, users and data from threats residing inside and outside the network.