Page 47 - Cyber Defense eMagazine Special RSA Conference Annual Edition for 2022
P. 47

Achieving Zero Trust through Automation

            If a cloud infrastructure environment is pre-built, pre-configured, and standardized using automation —
            with a cloud-native platform that deploys in a day (directly in your own AWS or Azure account) and is pre-
            built to NIST 800-53 to enforce zero trust by design and default — then a modern zero trust architecture
            can be achievable and affordable for any size enterprise or organization. As such, developers can now
            build their cloud applications within the confines of zero trust principles as soon as they begin, even as
            early as day one. This means access rights become an integral component of the DevOps process and
            a critical part of automated configuration management practices. As new applications are added to the
            environment, developers work more seamlessly with security practitioners and  DevSecOps teams to
            configure access rights, authorization, logging, and other key infrastructure components.

            Now, rather than having individual people tinkering with security tool configurations and access rights,
            developers can code rights into automation scripts, then run those scripts against test environments,
            evaluate their success, and perfect those scripts over time. Security practitioners and secure DevOps
            teams can likewise automate the evaluation of access rights, quickly identifying overly permissive rights,
            compliance drift, and other potential threat vectors. As a result, security and SecOps teams can use
            automation to quickly revert access, find and fix misconfigurations, and identify indicators of compromise
            (IOCs).

            All this boils down to the fact that a zero trust approach appears to be the right way to improve your cloud
            security posture and the world is going in that direction. Of course, there are multiple ways to get there.
            Some paths seem faster and more logical than others. Now it’s up to you to choose.




            About the Author
            John  Vecchi  is  the  Chief  Marketing  Officer  (CMO)  of  Anitian.    As  Chief
            Marketing Officer, John brings more than 24 years of experience in high-
            tech marketing, strategy, product marketing, product management, sales
            and  consulting.  Most  recently,  John  was  Chief  Marketing  Officer  at
            ColorTokens and Anonyome Labs. Previously, he served as senior vice
            president of product marketing and strategy for Blue Coat Systems, Chief
            Marketing  Officer  for  Solera  Networks  (acquired  by  Blue  Coat),  Vice
            President of WW Marketing at Zscaler, Head of Global Product Marketing
            &  Strategy  for  Check  Point  Software,  as  well  as  executive  marketing
            consultant for Symantec and Sr. Director of Product Marketing for McAfee’s
            Network Security Business Unit. John still serves as an Advisor at Signal
            Peak Ventures and has a B.A. from the University of St. Thomas, St. Paul, MN, focusing on international
            business and foreign language. As CMO, John oversees global marketing, branding, communications,
            press & analysts, and go-to-market strategy & execution.

            John  can  be  reached  online  on  LinkedIn:  https://www.linkedin.com/in/johnvecchi  or  Twitter:
            https://twitter.com/johnvecchi and at our company website https://www.anitian.com/








                                                                                                              47
   42   43   44   45   46   47   48   49   50   51   52