{"id":159194,"date":"2021-06-25T06:00:00","date_gmt":"2021-06-25T11:00:00","guid":{"rendered":"https:\/\/www.ict-pulse.com\/?p=159194"},"modified":"2021-06-24T17:55:20","modified_gmt":"2021-06-24T22:55:20","slug":"zero-trust-security-what-it-is-and-why-msmes-should-take-it-seriously","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2021\/06\/zero-trust-security-what-it-is-and-why-msmes-should-take-it-seriously\/","title":{"rendered":"Zero trust security: what it is, and why MSMEs should take it seriously"},"content":{"rendered":"\n
Zero trust is an approach to cybersecurity that is garnering a lot of attention, as more organisations move to implement it. Although transitioning to a zero trust model is a massive undertaking, it is likely to influence how all businesses and organisations think about security.<\/em><\/p>\n\n\n\n <\/p>\n\n\n\n If there was any single, common theme that emerged from last week\u2019s roundup of Caribbean ICT\/tech news (for the week ending 20 June 2021)<\/a> is cybercrime and cybersecurity. There were many reports about increases in cybercrime in the region, and the concern that countries are not as prepared as they should be.<\/p>\n\n\n\n To be fair, there has been a growing awareness of the importance of security in the Caribbean region; but businesses, and even governments, might be challenged to provide the resources needed to effectively maintain the security of their networks and systems. To a considerable degree, security is becoming a fulltime job \u2013 both literally and figuratively. IT or security personnel are charged with continually monitoring, testing, upgrading, and maintaining the security of the networks under their care, whilst also keeping up to date on the latest trends and developments, and trying to ensure that network users are exercising the requisite care.<\/p>\n\n\n\n As much as more organisations have been focussing on cybersecurity, there are no guarantees, even with the best effort, that one\u2019s organisations will not be successfully breached. However, there have been concerns that the typical approach to security might be too weak in light of the scale and sophistication of the threats we have been experiencing. Organisations, particularly enterprises appear to be moving towards a \u2018zero trust model\u2019 or \u2018zero trust architecture, which although created over a decade ago, only now seems to be becoming more mainstream.<\/p>\n\n\n\n In this article, we give a brief primer on zero trust security, and conclude by sharing some views on why this approach to security ought to be taken seriously.<\/p>\n\n\n\n <\/p>\n\n\n\n Traditionally, network security was conceptualised to \u2018keep out the bad guys\u2019, i.e. \u2018perimeter security\u2019, through the use of firewalls, passwords and other forms of access controls, virtual private networks, to name a few. Consequently, and as a default, the users inside the network were trusted, and those who provide the required access credentials were granted access \u2013 similar to a castle with a drawbridge.<\/p>\n\n\n\n Zero trust security goes by many names, including \u2018perimeterless security\u2019, and its premise turns perimeter security on its head. Essentially, no user or device is implicitly trusted, or trusted by default \u2013 even if they are (or remain) connected to a managed corporate network. Zero trust security assumes that the network has been compromised, and so continually requires users and devices to prove that they are not attackers.<\/p>\n\n\n\n Although the concept of zero trust might initially have been adopted for remote and cloud-based users and assets, when entities would have needed to connect to their organisation\u2019s corporate network via the internet, for example, it now encompasses all elements and assets on the network, regardless of location. In other words, even if a user, device, asset, etc., are located within an organisation\u2019s own network boundary, and even if is connected directly to the corporate network, that resource is not automatically trusted.<\/p>\n\n\n\nZero trust security: what is it?<\/h2>\n\n\n\n