Intelligent CIO Middle East Issue 77 | Page 76

t cht lk

t cht lk

Third-party services such as SaaS and PaaS can ’ t be trusted . It only takes a single breach of a single third-party service that ’ s overly trusted to compromise your network assets .
A better network security architecture
The realities of 21st-century enterprise networking required a new paradigm and in 2010 , John Kindervag , an analyst at Forrester Research , wrote a paper that popularised the idea of the Zero Trust architecture . Over the next few years , as enterprise computing evolved to embrace cloud computing and the problems with perimeter security became more pressing , the concept of the Zero Trust architecture gained traction .
The fundamental concept of the Zero Trust architecture is simple : Never trust , always verify .
To reiterate , the Zero Trust security architectures are based on not trusting anyone or anything on your network . This means that network access is not granted without the network knowing exactly who you are . Moreover , every access attempt by any entity
must be validated at multiple points throughout the network to make sure no unauthorised entity is moving vertically into or laterally within the network without being detected .
Making a Zero Trust network really work requires indepth traffic inspection and analytics . Central to this is the use of SSL inspection solutions that decrypt and analyse encrypted network traffic ( sometimes called ‘ break and inspect ’) to ensure policy compliance and maintain privacy standards .
By monitoring encrypted traffic to detect suspicious network communications and malware payloads as well as attempts to exfiltrate controlled data , for example , credit card and social security numbers , SSL inspection makes it possible for the Zero Trust model to comprehensively do what it ’ s supposed to do – protect networks from both internal and external threats .
Five reasons why you need to migrate to a Zero Trust security architecture
If you haven ’ t started down the path of reengineering your network to become a Zero Trust network , here are the five crucial reasons to do so :
1 . The complexity of your network – the number of users , where they work , the devices they use , the number of workloads , your use of SaaS , adoption
76 INTELLIGENTCIO MIDDLE EAST www . intelligentcio . com