Express Computer
Home  »  News  »  Zero Trust is a framework for securing organisations in the cloud and mobile world: Debojit Maitra, CISO, Aditya Birla Fashion & Retail Ltd

Zero Trust is a framework for securing organisations in the cloud and mobile world: Debojit Maitra, CISO, Aditya Birla Fashion & Retail Ltd

0 214

Zero Trust is a lucid thing to understand, it is a framework for securing organisations in the cloud and mobile world that asserts that no user or application should be trusted by default. Following a key Zero Trust principle, least privilege access trust is established based on context with policy checks at each step. 

Key components of Zero Trust

Authentication, process, policy, verification and most importantly enforcement, are the fundamentals of a Zero Trust network which comes with the advantage of functioning as per the activity logs of the user. Apart from these, user analytics, device, network application analytics and visibility, automation, and orchestration are the parameters responsible for the Zero Trust component.

User authentication is based on multi-factor nowadays, two factors are considered, not only the OTP but also authentication via Gmail or office mail. Analytics is done by machine learning system, considering what are the output, continuous or recurring, also what came out in the market is also Identity Access Management, but we are using a much more advanced technique called Adaptive Identity Access Management, containing two Matrix, one being Vectors, and another called Identity, both contributing in giving out the desired output; and the device is trusted by device management, device compliance, device authentication. Micro-segmentation is also important to the server part, it is the same as a concept controller and gateway but in between application and database. The MAC address has to be taken and it has to be mapped so that if by any chance the id gets hacked at least if the user is authenticated the device is not authorised to access, making the three crucial parameters the Zero Trust component.

Secure remote connectivity

The policy engine, policy decision, and policy administration help in the secure connectivity of various networks remotely, ensuring that the VPN connector to the data server center is authentic, by generating a multi-factor authentication, following protocols of user-device authentication, and scanning for malware. The user information after authentication is sent to the data panel from the control panel and works as a software-based dynamic firewall. This process is broadened into two categories called, Data Plane (used for data communication) and Control Plane (device/ user authentication).

Software-defined parameter

Today 1024 users are connected to VPN and out of the 14,000 of their employees 10,000 are using VPN. After the circular being released by the government stating “VPN for the government employees must be stopped” finding a new alternative came up as a challenge. This is where “Software Defined Parameter”, which is a part of Zero Trus.t came to the rescue and replaced VPN, VPN worked in layers 3 and 4 but this works in policy layer 7, which means that one has to have two VMS or VM in your controller which may or may not be in the premises, the gateway is another important factor which must be a part of the data center or cloud. By ensuring these two measures we are confident that even if the device is compromised, the hacker unaware of the agent’s policy cannot get into the server and the data will be safe.

Analytics and automation

Analytics capability helps to bridge existing security solution silos. Aggregated application deployment, usage, device security, and end-user experience details help to better understand the performance and security of the digital workspace environment. 

Five elements are taken under consideration when it comes to analytics and automation, including device trust (device management, authentication, compliance, inventory), session Trust (micro-segmentation, transcript encryption, session protection) data trust (protecting data at rest, integrity, DLP, classification), user trust (password less authentication, MFA, conditional access, dynamic risk score) application trust  (any device access, single sign-on).

Conclusion

Today over 60-70 percent of the workforce is working remotely, Many companies in the US  have shifted to small workspaces because the cost is reducing, this is the way the parameter process will phase out and facet technology will come in. Zero Trust is remote browser isolation, if we use open sources like GitLab there is no authentication; so the remote browser isolation is your browser when it goes to the service provider browser, it will send the data to your network and then bring and dump the data as a pixel.

Zero trust workflow 

  • Grant access
  • Validate trust
  • Gather Analytics 
  • Build Automation 

(Compiled by Sunidhi Malla)

(These are some edited excerpts from Debojit Maitra’s address on ‘Mitigating Security Risk with the Zero Trust Approach’ at Tech Senate 2022).

Get real time updates directly on you device, subscribe now.

Leave A Reply

Your email address will not be published.

LIVE Webinar

Digitize your HR practice with extensions to success factors

Join us for a virtual meeting on how organizations can use these extensions to not just provide a better experience to its’ employees, but also to significantly improve the efficiency of the HR processes
REGISTER NOW 
India's Leading e-Governance Summit is here!!! Attend and Know more.
Register Now!
close-image
Attend Webinar & Enhance Your Organisation's Digital Experience.
Register Now
close-image
Enable A Truly Seamless & Secure Workplace.
Register Now
close-image
Attend Inida's Largest BFSI Technology Conclave!
Register Now
close-image
Know how to protect your company in digital era.
Register Now
close-image
Protect Your Critical Assets From Well-Organized Hackers
Register Now
close-image
Find Solutions to Maintain Productivity
Register Now
close-image
Live Webinar : Improve customer experience with Voice Bots
Register Now
close-image
Live Event: Technology Day- Kerala, E- Governance Champions Awards
Register Now
close-image
Virtual Conference : Learn to Automate complex Business Processes
Register Now
close-image