Thursday, August 11, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Opinion > Zero Trust is the new “Doveryay, no proveryay”

Zero Trust is the new “Doveryay, no proveryay”

Zero Trust will help remote working corporates to manage and orchestrate the whole system securely and implement the necessary safeguards and monitor them easily.


Atalay Kelestemur Atalay Kelestemur
February 19, 2022
3 min read
Zero Trust is the new "Doveryay, no proveryay"

Trust, but verify is a rhyming Russian proverb, which was also used by U.S. President Ronald Reagan frequently when discussing U.S. relations with the Soviet Union. Today, the IT security universe is taking up the proverb seriously. Zero Trust is a security policy that focuses on the belief that organizations should not automatically trust anything inside or outside their own environment and instead verify everything that tries to connect to their system before granting access.

Zero Trust information security model

The Zero Trust information security model basically breaks the old fortress-and-ditch mentality of organizations focused on protecting their own environment and assuming that everything that already inside does not pose a threat and is therefore accessible. Security and technology experts who say that the fortress-and-ditch approach does not work a point out that some of the most terrible data breaches occur after hackers gain access to corporate firewalls so that they can act on internal systems without much resistance.

Today, modern corporate networks consist of interconnected zones, cloud services, and mobile environments. The zero-trust approach is getting more important because the traditional trusting devices within a corporate perimeter or connected via a VPN is not relevant in today’s complex IT environments.

It is very important to have a strict security model that constantly carries out checks to improve security in modern organizations where users and devices are far away and threats bypass traditional environmental defenses. Before accessing the network, all devices and users must be identified, authenticated, provided with the minimum necessary access, and then constantly monitored.,

Basic requirements of Zero Trust

Zero Trust also means being safe just an hour ago does not mean the system is still being safe. With that in mind, every access to the network or to the data must be re-evaluated based on the corporate policies, developed based on common security standards. As an advanced cybersecurity practitioner, it is not hard to say even the big companies don’t apply these standards properly.

Most systems allow the users to download, share, copy, modify, and transmit the data across the network and user devices without any access control systems. Thus, the data is also shared across the cloud services. Also please keep in mind that these organizations do not classify sensitive data. In any way, it is the responsibility of the corporate to keep the data safe, and as the data is stored or moved without any safeguards or controls, it becomes a big risk.

Zero Trust requires the following basic components:

  • Comprehensive visibility – Active and passive discovery can help you implement controls, ensuring full visibility of all users and devices on your network.
  • Minimal access micro-segmentation and control – Access control policies provide access to resources that are absolutely necessary for a device or user, and from other sources that are not required.
  • Continuous monitoring and implementation – Continuous monitoring of users and devices on the network greatly reduce the risks associated with threats and malware.

Zero Trust should be well understood and implemented in each organization. The policies should be renewed and the scope should be expanded. Zero Trust must be applied to the whole corporate system including the cloud services. Within a Zero Trust implemented corporate, the security controls are not applied only when the data is accessed, but also each time it is shared or used.

Zero Trust in post-Covid era

Zero Trust helps to ensure network security in today’s working-age of mobility, IoT, and home environments. It limits exposure to security risks associated with vulnerable IoT devices and helps reduce the risk of advanced threats that bypass traditional environmental safety controls. Zero Trust also limits damage related to lateral movement by attackers and infected devices. It brings a more holistic approach to security, regardless of who or what is connected from where. Zero Trust applies best practices such as micro-segmentation for the “Least Access” approach.

The usefulness and importance of the Zero Trust approach to security have increased as remote working is adopted almost all over the world during the COVID-19 pandemic. It is still expected to see accelerated adoption of a remote working model in the post-Covid era, which means Zero Trust is also getting more important and becoming more common and widespread.

It will be more important for the corporates to adopt Zero Trust principles to enable their employees to access cloud-based services securely as well as on-premise services. In the near future, Zero Trust will also help remote working corporates to manage and orchestrate the whole system securely and implement the necessary safeguards and monitor them easily.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Weekly tips tricks Linux 1

Weekly tips & tricks: Linux #1

Related News

Is it possible to be a humble manager?

Is it possible to be a humble manager?

July 30, 2022 7:40 pm
Effective network strategies: Managing traffic spikes and improving performance

Effective network strategies: Managing traffic spikes and improving performance

May 28, 2022 2:00 pm
Intentional user-unfriendly interfaces of popular services

Intentional user-unfriendly interfaces of popular services

May 21, 2022 1:00 pm

What is Windows 365? Why does it matter?

April 30, 2022 5:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the Cloud7 Newsletter

Sign up for the Cloud7 Newsletter to receive the latest IT business updates straight to your inbox daily.

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

10 Best Web Hosting Services of 2022

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Recent News

  • CISA adds 2 new vulnerabilities to the list
  • Microsoft’s Patch Tuesday fixes 121 vulnerabilities
  • Electrical explosion at Google U.S datacenter
  • DuckDuckGo includes Microsoft in its 3rd-party tracker protection
  • Critical bugs found in the US Emergency Alert System


Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.