Intelligent CIO LATAM Issue 29 | Page 33

TALKING

‘‘ business

In an increasingly digital world where cybersecurity threats are constantly evolving , organizations are embracing new strategies to protect their sensitive data and assets .

Jaye Tilson , Field CTO , HPE Aruba Networking
One such approach that has gained prominence in recent years is Zero Trust . Zero Trust challenges the traditional perimeter-based security mindset and instead places a strong emphasis on identity as a cornerstone of a robust defense strategy .
Rethinking Traditional Perimeter Security
Traditionally , organizations relied on perimeter-based security models that operated under the assumption that threats could be kept at bay by securing the network perimeter . However , as cyberattacks became more sophisticated , it became clear that this approach was no longer effective . Attackers found ways to bypass these perimeter defenses , rendering them inadequate .
Zero Trust flips this model on its head by adopting a ‘ never trust , always verify ’ philosophy .
In a Zero Trust environment , trust is never assumed , regardless of whether a user or device is inside or outside the corporate network .
Identity plays a pivotal role in verifying and authenticating users and devices , ensuring that access to resources is granted based on their identity , permissions and the context of their request .
Context-Aware Access Control
Identity is at the heart of context-aware access control , a fundamental component of Zero Trust . Contextaware access control takes into account various factors , including user identity , device health , location , time and behavior to determine whether a user should be granted access to a specific resource . This
approach ensures that access is granted on a case-bycase basis , minimizing the attack surface and reducing the risk of unauthorized access .
For example , a user attempting to access a critical database from an unfamiliar device and location may trigger additional authentication measures or even deny access entirely until their identity and intent are verified . This dynamic approach to access control enhances security while allowing for flexibility and user productivity .
Continuous Monitoring and Adaptive Authentication
Zero Trust extends beyond the initial authentication process ; it emphasizes continuous monitoring and adaptive authentication . In this context , identity is not a one-time verification but an ongoing process . Users and devices are continually assessed for risk , and access privileges can be adjusted in real time based on changing circumstances .
Brian Ramsey , VP America , Xalient
www . intelligentcio . com INTELLIGENTCIO LATAM 33