wonderfully unique software solutions

‘Zero trust’ cybersecurity approach is misunderstood: Stormshield

Trusting nothing and no one when it comes to network access is impractical if not completely impossible, endpoint security vendor Stormshield has suggested.

Sébastien Viou, blogging for Stormshield, says the zero-trust network approach commonly advocated has been widely misunderstood, if not misapplied.

“It’s based on a simple premise: to secure your IT system against cyber threats, you must doubt everything and trust nothing. But rather than abolishing trust, could the issue be more one of moving it elsewhere?” he writes.

Viou notes that systems architectures have changed, fragmenting the perimeter — especially with the rise of secure teleworking, bring-your-own-device (BYOD), and cloud computing. Mounting tough defences only at the network perimeter no longer makes as much sense.

Identifying and authenticating users can be done via virtual private networking (VPN), remote login tools and multifactor authentication solutions. But there’s still “a mixed bag of applications and uncontrolled equipment” to manage — which is partly why so many promote the zero-trust concept.

Stéphane Prévost, product marketing manager at Stormshield, describes zero-trust as impossible.

“When you’re providing access to sensitive assets, you need something tangible to hold on to,” Viou quotes him as saying.

“What really matters in the zero-trust approach is the user/machine combination. Even if a user has been authenticated, the device they’re using is still a potential vulnerability. For example, it may have been infected by a virus which will be able to access sensitive content and encrypt data. We therefore also need a way of trusting the machine.”

Viou says the question should be more about awarding the correct amount of trust for the sensitivity of the information or that is needed to protect the environment — instead of verifying logins, identities and privileges every time the network is accessed, including within the corporate network.

“To achieve this, asset protection solutions must factor in issues of context-sensitive policies and dynamic adaptability. And as a result, ensure that security is tailored to the specific environment,” he says.

Access must be managed according to the nature of the workstation (business or personal), software used, update status of its security solutions, and whether the device is at home, in the office, on the move or wherever, Viou says.

Read the full Stormshield blog.

( Photo by HAYDER ALABBA on Unsplash )

Recent Articles

LANSA low-code helped these IT providers build their businesses

Even specialist IT companies use low-code strategies and technology to help them move up in their markets, gaining market share alongside the...

Foxit PDF editor suite expands AI capabilities for 2024

Smart PDF commands and enhanced AI assistant functionality are set to give the desktop and cloud versions of Foxit PDF Editor Suite...

Vyond bundles in further AI and branding capabilities for corporate creatives

Video creation platform vendor Vyond is expanding its offerings with new brand-management tools as well as further generative AI functionality responding to...

LastPass analyst warns of looming credentials crisis

Organisations should beware of an oncoming crisis in the secure management of user access, according to a cybersecurity specialist at password management...

Octopus Deploy follows Codefresh buy with 2024.1 Server

Continuous delivery (CD) pipeline platform vendor Octopus Deploy has acquired fellow development software specialist Codefresh and rolled out a new version of...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox