At the same time, history has taught us that properties, such as houses, are something that "individuals" - often criminals – may want to break into. Today's methods of protecting properties from burglary are often far more than simple door locks or walls made of fragile materials. But what is it that determines whether "someone" is allowed to enter a building or into a specific room? Is it because we trust them? Have they told us who they are? Do they have an errand?
To understand the history behind this, we must go back in time - and significantly further than you may think.
Although the city of Troy was built according to all the best practices and advice of the time, the city walls were still not strong enough to withstand the human ability to "trust someone."
In IT security, this story is used to argue for what is referred to as "perimeterless security" or the "zero trust model" (i.e., Zero Trust). The argument for Zero Trust is quite simple, namely that we cannot solely base our security measures on hard perimeters. The traditional approach with hard perimeters is in direct conflict with modern business models, where interaction, sharing and close integrations characterize digital development. Through its daily work with customers, Defendable still sees that many have great faith that security is formed in technological gadgets and networks, and that this "automagically" creates Zero Trust. Defendable has a different view, where Zero Trust must rather be interpreted as a strategic framework that considers context-based and process-centric security.
In 2007, the Jericho Forum Commandments was formalized as a result of the lack of public discussion about perimeterless security. Four of their commandments are listed below:
- Devices and applications must communicate using open and secure protocols.
- All devices must be able to maintain their own security on an unreliable network.
- All people, processes and technologies must have a declared and transparent level of trust for all transactions that take place.
- It must be possible to determine the levels of mutual trust.
You can no longer rely on the network to protect data or information within an application. The data security must be moved closer to where the data occurs. This often means that one or more of the following measures should be implemented:
- establishment of micro-perimeters, segmentation gates and next-generation firewalls,
- increased use of logging and intrusion detection at application level,
- multi-factor authentication, and / or
- measures that prevent data exfiltration.
The focus should in any case turn in a strategic direction, where trust modelling and "Never Trust, Always Verify" become core components in how to secure data within the business. At the same time, the network should safeguard other values for the business, such as uptime.
Defendable is now building a market-leading security architecture team. The team will, among other things, help our customers establish Zero Trust architectures, as part of the company's holistic approach to cyber and information security. In this way, the chance is reduced that customers in particular, and society in general, are tricked - often based on excessive respect and false trust - into accepting hollow horses filled with attackers with evil intentions and subsequent costly repercussions.
Written by Øystein Balstad on behalf of Defendable AS. Proofreading and translation by Sophia Andersen.