Saturday, February 4, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Opinion > Zero Trust is the new “Doveryay, no proveryay”

Zero Trust is the new “Doveryay, no proveryay”

Zero Trust will help remote working corporates to manage and orchestrate the whole system securely and implement the necessary safeguards and monitor them easily.


Atalay Kelestemur Atalay Kelestemur
February 19, 2022
3 min read
Zero Trust is the new "Doveryay, no proveryay"

Trust, but verify is a rhyming Russian proverb, which was also used by U.S. President Ronald Reagan frequently when discussing U.S. relations with the Soviet Union. Today, the IT security universe is taking up the proverb seriously. Zero Trust is a security policy that focuses on the belief that organizations should not automatically trust anything inside or outside their own environment and instead verify everything that tries to connect to their system before granting access.

Zero Trust information security model

The Zero Trust information security model basically breaks the old fortress-and-ditch mentality of organizations focused on protecting their own environment and assuming that everything that already inside does not pose a threat and is therefore accessible. Security and technology experts who say that the fortress-and-ditch approach does not work a point out that some of the most terrible data breaches occur after hackers gain access to corporate firewalls so that they can act on internal systems without much resistance.

Today, modern corporate networks consist of interconnected zones, cloud services, and mobile environments. The zero-trust approach is getting more important because the traditional trusting devices within a corporate perimeter or connected via a VPN is not relevant in today’s complex IT environments.

It is very important to have a strict security model that constantly carries out checks to improve security in modern organizations where users and devices are far away and threats bypass traditional environmental defenses. Before accessing the network, all devices and users must be identified, authenticated, provided with the minimum necessary access, and then constantly monitored.,

Basic requirements of Zero Trust

Zero Trust also means being safe just an hour ago does not mean the system is still being safe. With that in mind, every access to the network or to the data must be re-evaluated based on the corporate policies, developed based on common security standards. As an advanced cybersecurity practitioner, it is not hard to say even the big companies don’t apply these standards properly.

Most systems allow the users to download, share, copy, modify, and transmit the data across the network and user devices without any access control systems. Thus, the data is also shared across the cloud services. Also please keep in mind that these organizations do not classify sensitive data. In any way, it is the responsibility of the corporate to keep the data safe, and as the data is stored or moved without any safeguards or controls, it becomes a big risk.

Zero Trust requires the following basic components:

  • Comprehensive visibility – Active and passive discovery can help you implement controls, ensuring full visibility of all users and devices on your network.
  • Minimal access micro-segmentation and control – Access control policies provide access to resources that are absolutely necessary for a device or user, and from other sources that are not required.
  • Continuous monitoring and implementation – Continuous monitoring of users and devices on the network greatly reduce the risks associated with threats and malware.

Zero Trust should be well understood and implemented in each organization. The policies should be renewed and the scope should be expanded. Zero Trust must be applied to the whole corporate system including the cloud services. Within a Zero Trust implemented corporate, the security controls are not applied only when the data is accessed, but also each time it is shared or used.

Zero Trust in post-Covid era

Zero Trust helps to ensure network security in today’s working-age of mobility, IoT, and home environments. It limits exposure to security risks associated with vulnerable IoT devices and helps reduce the risk of advanced threats that bypass traditional environmental safety controls. Zero Trust also limits damage related to lateral movement by attackers and infected devices. It brings a more holistic approach to security, regardless of who or what is connected from where. Zero Trust applies best practices such as micro-segmentation for the “Least Access” approach.

The usefulness and importance of the Zero Trust approach to security have increased as remote working is adopted almost all over the world during the COVID-19 pandemic. It is still expected to see accelerated adoption of a remote working model in the post-Covid era, which means Zero Trust is also getting more important and becoming more common and widespread.

It will be more important for the corporates to adopt Zero Trust principles to enable their employees to access cloud-based services securely as well as on-premise services. In the near future, Zero Trust will also help remote working corporates to manage and orchestrate the whole system securely and implement the necessary safeguards and monitor them easily.

Atalay Kelestemur

Atalay Kelestemur

Atalay Kelestemur is the Editor-in-Chief of Cloud7 News. Also, he is the Program Manager of AlmaLinux OS, an open-source, community-driven Linux operating system. He was most recently the chief editor of T3. Prior to that, he was the managing editor of BYTE. He also served as a software editor in PC World. Atalay Kelestemur has covered the technology industry since 1996, publishing articles in PC Net, IT Pro, Computer World, PC Life, CyberMag, and CIO magazines. Atalay Kelestemur is an information system security professional and his area of expertise includes Linux security, penetration testing, secure software development, malware removal, and computer forensics. Atalay Kelestemur is the author of Pardus 2011, Ubuntu, Windows 8, and Siber Istihbarat (Cyber Intelligence). Atalay graduated with a Bachelor's Degree in Maritime from Istanbul Technical University. He earned a master's degree in political science from Gedik University, where he wrote his thesis on The Importance of Cyber Intelligence on Public Security. Now he is working on his Ph.D. thesis on international trade, covering the cybersecurity threats and countermeasures on the maritime industry.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Weekly tips tricks Linux 1

Weekly tips & tricks: Linux #1

Related News

Emre Baran, Co-founder & CEO at Cerbos.

Cloud7 Expert Series: Emre Baran from Cerbos

January 28, 2023 3:00 pm
The great exodus of women leaders

The great exodus of women leaders has begun

January 22, 2023 7:40 pm
Cloud7 Expert Series - Kevin Coupal from KeepSec

Cloud7 Expert Series: Kevin Coupal from KeepSec

January 21, 2023 4:00 pm
Cloud7 Expert Series Andre Reitenbach from Gcore

Cloud7 Expert Series: Andre Reitenbach from Gcore

January 14, 2023 7:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • LockBit encryptor source code is updated
  • LibreOffice 7.5 Community is released. What’s new?
  • NTT to add Palo Alto Networks’ solution to its portfolio
  • Gcore announces partnership with Super Protocol
  • Fortinet is expanding its SOC offerings portfolio

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.