wonderfully unique software solutions

‘Zero trust’ cybersecurity approach is misunderstood: Stormshield

Trusting nothing and no one when it comes to network access is impractical if not completely impossible, endpoint security vendor Stormshield has suggested.

Sébastien Viou, blogging for Stormshield, says the zero-trust network approach commonly advocated has been widely misunderstood, if not misapplied.

“It’s based on a simple premise: to secure your IT system against cyber threats, you must doubt everything and trust nothing. But rather than abolishing trust, could the issue be more one of moving it elsewhere?” he writes.

Viou notes that systems architectures have changed, fragmenting the perimeter — especially with the rise of secure teleworking, bring-your-own-device (BYOD), and cloud computing. Mounting tough defences only at the network perimeter no longer makes as much sense.

Identifying and authenticating users can be done via virtual private networking (VPN), remote login tools and multifactor authentication solutions. But there’s still “a mixed bag of applications and uncontrolled equipment” to manage — which is partly why so many promote the zero-trust concept.

Stéphane Prévost, product marketing manager at Stormshield, describes zero-trust as impossible.

“When you’re providing access to sensitive assets, you need something tangible to hold on to,” Viou quotes him as saying.

“What really matters in the zero-trust approach is the user/machine combination. Even if a user has been authenticated, the device they’re using is still a potential vulnerability. For example, it may have been infected by a virus which will be able to access sensitive content and encrypt data. We therefore also need a way of trusting the machine.”

Viou says the question should be more about awarding the correct amount of trust for the sensitivity of the information or that is needed to protect the environment — instead of verifying logins, identities and privileges every time the network is accessed, including within the corporate network.

“To achieve this, asset protection solutions must factor in issues of context-sensitive policies and dynamic adaptability. And as a result, ensure that security is tailored to the specific environment,” he says.

Access must be managed according to the nature of the workstation (business or personal), software used, update status of its security solutions, and whether the device is at home, in the office, on the move or wherever, Viou says.

Read the full Stormshield blog.

( Photo by HAYDER ALABBA on Unsplash )

Recent Articles

Many may quit if employers halt hybrid working, says AnyDesk

A survey by AnyDesk has suggested that working remotely or at least in a hybrid environment has become so popular that many...

Why sovereignty matters in converged industrial operations tech

Retaining digital independence is the best way to enable an autonomous response with regard to cyber incidents that strike at industrial production,...

Paessler partners Rittal on IT and OT monitoring convergence

Germany-based Paessler and Rittal are combining their Paessler PRTG and Rittal CMC III monitoring offerings as part of their Paessler Uptime Alliance...

TechSmith introduces Camtasia 2022 for faster, enhanced video creation

Corporate content producers will enjoy new features in Camtasia 2022 set to speed up and enhance video editing and creation, according to...

Road to the top for Manchester United with TeamViewer Tensor

One of the world's most famous football teams, Manchester United, relies on enterprise-grade remote connectivity from TeamViewer for ensuring access to critical...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox