Page 214 - Cyber Defense eMagazine June 2024
P. 214

How to Design a Zero Trust Strategy


            for Remote Workers


            By Federico Charosky, Founder and CEO, Quorum Cyber


            The modern workforce expects to work anywhere from any device. To support this approach investment
            is needed in a broader security program beyond the network. Identity is the new security perimeter as
            complemented by intelligently managed devices, the applications they run and the data they access.

            To answer the question of designing a secure solution for remote workers we need to start by setting
            some context. First, what is zero trust? This has three pillars which are explained below but can also be
            encapsulated by the idea that the network carries little trust. The concept of coming to an office to plug
            into a network point or WiFi to get full access to an organization’s resources is swiftly receding. The
            network has too much of an attack surface, too many hidden doors and is stretched to breaking point
            (VPN anyone?) to provide a reliable security perimeter. Instead of the network, a zero-trust strategy
            implies:

               1.  Authenticate. Always and often. Normally user authentication with a username and password,
                   but a lot more in the future.




            Cyber Defense eMagazine – June 2024 Edition                                                                                                                                                                                                          214
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   209   210   211   212   213   214   215   216   217   218   219