Intelligent CIO LATAM Issue 38 | Page 17

LATEST INTELLIGENCE
What exactly is zero trust architecture ? How should organizations consider implementing it ? What are its implications for organizations ’ broader cybersecurity infrastructure ? How can they conduct digital forensic investigations in zero trust environments ? This whitepaper explains these concepts and offers practical advice for digital forensic professionals looking to conduct investigations in zero trust environments .
Why Zero Trust ?
Historically , organizations secured their IT infrastructure and data by creating and hardening a perimeter . Organizational assets , including networks , software , and data storage resided inside the perimeter , in terms of both the physical and cyber-environments . Think of ID cards or keys to enter the office , servers stored inside secure rooms with limited access , and on-premises data and applications secured behind firewalls .
If you think about corporate information architecture today , data is stored on servers , cloud data storage , on personal devices , and in SaaS software solutions . Applications too exist in multiple places : on network servers and smartphones , on laptops and in the cloud . Workers log in from offices , home , through mobile devices , and even from wi-fi networks in a local coffee shop . Threats to security arise from outside the organization – and within – in the form of bad actors , phishing attacks , and malware-infected devices . Securing the perimeter no longer protects an organization from cyberthreats . p
www . intelligentcio . com INTELLIGENTCIO LATAM 17