Intelligent CIO APAC Issue 10 | Page 82

FINAL WORD

Tips for implementing zero trust : Taking trust away from security

Matthew Heap , Head of Solution Architecture , APJ for Rackspace Technology , advises tech leaders how to get their bearings with zero trust as they start to think about how they might implement it .

Whether it ’ s between leaders , managers and workers , vendors and customers , or companies and regulators , trust lowers the barriers to cooperation and keeps things moving smoothly .

Still , most businesses – and people – recognize that to be too trusting too soon can be a serious disadvantage . For one emerging network security model , any trust at all is too much .
We ’ re talking about zero trust , an approach to security that ’ s experienced skyrocketing interest this past year as enterprises have seen their traditional network perimeters stretched perilously thin by mass remote working and expansion to public cloud and SaaS applications .
In simple terms , zero trust means ‘ never trust , always verify ’. Zero trust has become a hot topic for executives since remote access rapidly expanded due to COVID-19 and there was an increase in adversaries looking to exploit remote users and computers . Never trusting and always verifying is more rigorous , proactive and responsive than just building perimeter defenses to keep malicious actors out of networks multi-cloud workloads and applications along with remote access from anywhere on any device , perimeter-based trust models are increasingly failing to provide appropriate safeguards .
In 2020 , Forrester predicted that Asia Pacific will finally catch up on zero trust adoption . Although zero trust adoption in Asia Pacific has lagged behind its global peers , the acceleration of cloud adoption and an explosion in remote work as well as changing regulations and consumer behaviors make it ripe for change .
82 INTELLIGENTCIO APAC www . intelligentcio . com