Page 80 - Cyber Defense eMagazine March 2024
P. 80

Is Zero Trust Enough?

            Why Zero Access Is a Better Way to Protect Your Backup Infrastructure

            By Greg Tevis, Vice President of Strategy, Cobalt Iron


            Backup has always been seen as the last line of defense in data security. After all, if your backups are
            safe, then you can recover from most forms of attack. That’s why as much as 93% percent of ransomware
            attacks these days may be going after backup data — to thwart that last line of defense. If attackers can
            get to the backup data, then they have the upper hand.

            Right now, the zero-trust approach to data and resource security is all the rage. Every large backup
            vendor touts it. It’s almost a knee-jerk reaction to invoke zero trust as the way to prevent these attacks.

            To understand why that is, it helps to first understand the logic behind zero trust.

            Traditionally, each user of a computer resource (e.g., data, network, system, or database resource) would
            have a login, and if that login is verified once, then that user would be privileged to move around and
            conduct tasks anywhere inside the domain of that resource. For example, with access to Active Directory,
            they could change who and what gets access to your network assets. With access into Exchange, they




            Cyber Defense eMagazine – March 2024 Edition                                                                                                                                                                                                          80
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   75   76   77   78   79   80   81   82   83   84   85