Page 134 - Cyber Defense eMagazine December 2022 Edition
P. 134

To  properly  and  fully  protect  your  evolving  hybrid  environment,  you  need  to  implement  a  zero-trust
            architecture, which includes cloud-native security and an understanding of the limitations of network
            perimeter security. Let’s look at some of the ways you can benefit from this approach:


               1.  Shrink  the  attack  surface:  Your  users  connect  directly  to  SaaS  or  private  apps  and  other
                   resources they need to do their jobs, but less frequently to the network. As such, there’s little risk
                   of lateral attacks or compromised devices infecting other resources, but still a risk of data being
                   exfiltrated. By diminishing the attack surface, zero trust curtails the impact and severity of attacks,
                   which reduces the time and costs associated with response and remediation.

               2.  Improve  threat  detection:  All  data-sharing  and  data-access  activity  must  be  continually
                   monitored and compared to baselines built on analytics and historical trends to identify anomalous
                   behavior and traffic. With this combination of monitoring user behaviors, granular policies and
                   rules and security analytics, you’ll find it easier to discover internal and external threats.


               3.  Prevent data breaches: Since everything in zero trust is assumed to be risky, every access
                   request is inspected and authenticated before "trust" is granted. Even when trust is established,
                   it’s continually reassessed in terms of context, such as changes in the user's location or the type
                   of data that is  being accessed. A zero-trust model or architecture  provides secure access to
                   everything and everyone.



               4.  Reduce business risk: Zero trust provides better visibility and control over what and who is on
                   your network—users, devices, components and workloads—and how they are communicating. It
                   also enables you to manage and enforce data protection and web access policy company-wide.


            The ideal solution of a zero-trust architecture is a unified Security Service Edge (SSE) architecture that
            converges and integrates data and threat protection technologies and acceptable use control across
            private  apps,  shadow  IT,  SaaS  apps  and  web  traffic.  The  most  comprehensive  single-vendor  SSE
            solutions bring together a cloud access security broker (CASB), secure web gateway (SWG) and zero
            trust network access (ZTNA). SSE provides you with visibility across your infrastructure, making it easy
            to create, manage and enforce policies in one place.

            The  right  SSE  also  gives  you  powerful,  cloud-native  protection  for  any  device  anywhere—whether
            managed and agent-based or personal and agentless. A truly effective, data-aware SSE integrates data
            loss prevention (DLP) scanning, antimalware technology and remote browser isolation (RBI)—an ideal
            trio for protecting the internal and remote workforce.

            SSE also provides a single-pane-of-glass management platform that enables you to apply unified policies
            across cloud platforms, endpoints, the web, SaaS and private apps, regardless of whether your data is
            at rest or in motion. Consistent policy is applied corporate-wide and moves with the user and data instead
            of being tied to each access technology.






            Cyber Defense eMagazine – December 2022 Edition                                                                                                                                                                                                         134
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   129   130   131   132   133   134   135   136   137   138   139