Intelligent CIO North America Issue 12 | Page 43

FEATURE : ZERO TRUST similar IoT devices together to harden the network . This approach breaks up the lateral ( east – west ) path through the network , so it ’ s more difficult for hackers and worms to gain access to connected devices . It also reduces the risk that a hacker can use an infected device as a vector to attack the rest of the network .
3 . What happens to managed devices when they leave the network
Because people use BYOD devices both for personal and business needs , the third key to an effective ZTA strategy is understanding what happens when devices leave the network . When they aren ’ t logged into the network , users may browse the Internet , interact with others on social media and receive personal emails .
After being online , once they re-join the network these users can inadvertently expose their devices and company resources to threats they may have picked up , such as viruses and malware .
Controlling managed devices when they go off the network is challenging . Thanks to cloud services , people can disconnect their device from the network at one location and reconnect it at another . Or they might start working on one device and continue on another .
To contend with these challenges , endpoint security must be part of any ZTA solution . It should provide
off-network hygiene control , including vulnerability scanning , web filtering and patching policies . It should also provide secure and flexible options for Virtual Private Network ( VPN ) connectivity .
Like identity management tools , endpoint security should support SSO . When an endpoint is connected to the network , the solution should relay device status information to other network and security components to determine risk and assign appropriate access level .
Trust no one and leverage an effective Zero Trust access strategy
The more people and devices that connect to a network , the less secure a traditional perimeter-based approach becomes . Every time a device or user is automatically trusted , it places the organization ’ s data , applications and intellectual property at risk . CISOs need to shift the fundamental paradigm of an open network built around inherent trust to a Zero Trust model with rigorous network access controls that span the distributed network .
By selecting integrated and automated tools , CISOs can help overcome the key challenges of Zero Trust Access : knowing who and what is on the network , controlling their resource access and mitigating the risks of that access . p
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 43