Never Trust, Always Verify? Why Zero Trust is Becoming a Big Priority for Many

Photo by Philipp Katzenberger on Unsplash

The following post was written and/or published as a collaboration between Benzinga’s in-house sponsored content team and a financial partner of Benzinga.

Security Perimeters are Obsolete

Traditionally a cybersecurity strategy worked much like a castle. A strong defense perimeter was created — the castle wall — and the devices and users, once verified as the “good guys” and let through that perimeter, were then inherently trusted to get access to all areas of the castle. The castle’s defenses always faced outward, looking for external threats.

But as we know from history, many a king was killed by one of his own.

Zero Trust Continuously Verifies Identity 

Today’s IT systems are hyper-complex and made up of various ecosystems constantly interacting with each other. Internal systems are connected to cloud-based Software-as-a-Service (SaaS) solutions that are connected to remote and mobile devices, which are connected to smart devices. Users are now outside of the four walls of the enterprise, working remotely from home and on public networks. 

The key to Zero Trust is continuous identity verification. That means making sure users and devices are who they say they are. A password is the basic level of security here, but as is, passwords can rather easily be hacked. Also, with single sign-on, a user can get up from their desk and leave a point of entry exposed. It is therefore important that passwords and single sign-on systems be buttressed with additional security controls.

Is Multi-factor Authentication the Foundation?

According to some, the first foundational step of implementing a Zero Trust architecture, and increasing security is multifactor authentication (MFA). In this model, a user or device must provide additional layers of authentication, such as a password and a randomly generated security code sent via email or text. Some find MFA to be tedious, but its effectiveness is self-evident.

Positively Identify the Individual with Biometrics

BIO-key says that IBB factors, including fingerprint, face, palm, or voice verification, are permanently bound to the individual’s digital identity, ensuring the highest level of integrity is maintained each time that person requests access. IBB is positively identifying the individual and matching it to the originally enrolled identity, not just an enrolled device that they possess. 

Market News and Data brought to you by Benzinga APIs

To add Benzinga News as your preferred source on Google, click here.