1 / 8

Zero trust security architecture and maturity model to reduce complexity and save IT resources

Zero trust security architecture is like your extremely vigilant security guard, methodically and repeatedly checking your credentials before allowing you access to the office building, and then following the steps all over again to verify your identity whenever you want to enter any room in the building. <br>

Download Presentation

Zero trust security architecture and maturity model to reduce complexity and save IT resources

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Zero trust security architecture and maturity model to reduce complexity and save IT resources

  2. In zero trust security architecture, no user or device is trusted, be it inside or outside of the enterprise network, that wants to access its resources. No matter how many times the user or device has accessed the network resources earlier, verification and authentication are carried out each time the network is accessed, as every user, device and server is treated as untrusted until proven otherwise. Zero trust security architecture is like your extremely vigilant security guard, methodically and repeatedly checking your credentials before allowing you access to the office building, and then following the steps all over again to verify your identity whenever you want to enter any room in the building. • A zero trust security architecture relies on strong authentication and authorization for every device and user before they are allowed data transfer. The concept behind the Zero Trust security model is that devices should not be trusted by default, even if they are connected to a permissioned network and previously verified. It continually monitors for signals of compromise for possible threats, like a device showing different activity or suspicious patterns. This way, a zero trust security architecture defeats many common security attack threats. It ensures that no data transfer occurs until trust has been established. In addition, analytics, filtering and logging are applied to verify concerns of behavior, and to continually watch for signals of compromise.

  3. Zero Trust Network Access (ZTNA) technology - An identity-aware proxy • With a zero trust security architecture in place, organizations can be sure that attackers will no longer be able to take advantage of weaknesses in their network security in order to gain access to sensitive data and applications. There are just applications and users, each of which must mutually authenticate and verify authorization before access can occur. There are varying methodologies for delivering a Zero Trust architecture. One popular strategy is an access proxy architecture that runs entirely within a DMZ. It provides infinite bandwidth for caching and autoscales resources as needed. Akamai has designed Zero Trust Network Access (ZTNA) technology, an identity-aware proxy.

  4. Reducing the attack surface and preventing lateral movement • At the core of Zero Trust is the application of “microperimeters” of control around sensitive data assets. It reduces the attack surface and prevents lateral movement. The aim is that if a breach occurs, an intruder can't easily access other systems or sensitive data by moving laterally. Organizations can reduce the attack surface of critical systems and prevent the exfiltration of sensitive data by applying segmentation or micro-segmentation for fine-grained access control. • The architecture can improve network security postures while reducing the risk of malware. A zero trust maturity model reduces risk and complexity while delivering a consistent user experience. • As you move to the zero trust maturity model, your network will evolve to: • Application layer access and defenses • Network infrastructure isolation, and • Threat detection and internet traffic visibility • By embracing a Zero trust maturity model, organizations can quickly elevate their security posture to a higher maturity level, without introducing complexity. A Zero Trust framework offers some unique benefits, like a Zero Trust perimeter can be used as a virtual application firewall. By narrowing the patch population, organizations can patch quickly, observe for errors, if required, roll back quickly. A Zero Trust allows organizations to reduce security risks by capturing device signals, and sanctioning JavaScript and plug-ins that are enabled on the user’s browser, or blocking them if necessary.

  5. Protecting digital infrastructure of organizations • Modern workforces are becoming increasingly mobile, and employees access applications and data from multiple devices outside of the business perimeter. In the traditional “trust and verify” model, anyone with correct user credentials can access whichever app, site or device they request. This presents an increased risk of network exposure, dissolving what was once the trusted enterprise zone of control. This left many organizations exposed to data breaches, malware and ransomware attacks. Organizations need protection within their specific digital infrastructures where applications, data, users and devices are located. • Zero Trust Network Access (ZTNA), and Akamai’s Intelligent Edge Platform can be leveraged by organizations as growth enablers because the solutions can help move them to a perimeterless world by phasing in applications while ensuring protection at the same time.

  6. THANK YOU

More Related