
Zero Trust Architecture
In our connected world, everything is accessible to everyone, including your critical infrastructure. Employing a Zero Trust architecture will allow you to ensure that only authorized users can access what they need. There are simple solutions you can employ to verify users and access, but how extensive of a Zero Trust system you want to employ will be driven by your business and security needs. Below are some things you can do today with elements you already have in place:
- Allow only managed (mobile) devices to access corporate resources, to ensure corporate data is only accessed from, handled by, and stored on devices where security can be enforced using encryption, coupled with possible app containerization on mobile devices (especially for BYOD devices)
- Allow only legitimate, authenticated, authorized, and secured remote accesses to your infrastructure, using Virtual Private Network (VPN) technology coupled with Multi-Factor Authentication (MFA); if available, use in combination with a behavior-based security solution (e.g., UEBA)
- Control all traffic to your organization’s services and resources
-
- For on-premises resources, review your firewall/proxy server configuration and only allow necessary, business-critical traffic
- For cloud-based resources, it is recommended to use a Zero Trust Network Access (ZTNA) solution to control access to them. For example, only managed, trusted, and safe devices can connect, as these resources are online by default and thus virtually available to anyone, anywhere
Reduce the Surface of Attack
The less there is to attack, the less damage cyber criminals can make to your infrastructure:
- Disable any exposed, non-business essential services
- Update all your systems (both OS and apps), prioritizing all security patches for known CVEs
- Using your UEM solution, ensure all endpoints are also running latest OS version
-
- For personal devices, instruct your employees to regularly update their device OS and apps
Ensure You Can Detect Intrusions
It is important to be able to detect intrusions to stop them before they unfold into an attack that could cause serious damage:
- Make sure ALL your endpoints, personal and corporate, are protected by an antivirus/antimalware solution, preferably a Mobile Threat Defense (MTD) solution on your mobile devices and an Endpoint Protection Platform (EPP) on your desktop computers and servers
- If using an Endpoint Detection and Response (EDR) solution, it is recommended to increase the logging level of ensure more potential attack (or attempts) can be caught and acted upon
Ensure You Can Respond to Intrusions
- Confirm ownership of the cybersecurity response (who, what, how)
-
- Make sure key people are defined and available, 24/7
- Provide clear guidance for employees in case their computer/mobile device is compromised
-
- Who to contact, how, what to do with hacked device?
Ensure You Can Recover from an Attack
- Make sure you have a backup of all critical corporate data and make sure they work
-
- Isolate backups and HA/DR resources as much as possible
- Ensure HA is enabled when available on Mission Critical on-prem resources
- Update your Disaster Recovery (DR) plan if needed
- Test your DR plan! Don’t wait only to realize it doesn’t work
Train Your Employees
Your employees are your first and last line of defense against any attack to your infrastructure.
- According to CISA, 90% of successful cyberattacks start with email phishing, where human beings are the weak link. Even the best antispam solution in the market cannot filter/flag 100% of all email threats – a very small but nonetheless important portion of emails still rely on your employees not clicking on any link or opening any file they receive
- Make sure you have a proper password policy in place (complexity, expiration, storage)
It’s always a good idea to periodically reassess your critical infrastructure and see where you can improve and strengthen your security. By employing a Zero Trust architecture, reducing the
surface of attack, and ensuring your employees are trained and prepared on responding to and recovering from an intrusion, you stand the best chance of keeping your infrastructure safe and
sound.
For more comprehensive information about security posture, please review our two-part blog post about the “Security Maturity Model” (part 1 and part 2) as well as our recent post
regarding cybersecurity
products. Please feel free to contact the team at ISEC7, and we can help you navigate the options available to you to help strengthen and protect your infrastructure.
Contact
(C) Rémi Frédéric Keusseyan, Global Head of Training, ISEC7 Group