For those with zero trust in zero-trust networks, this industry alliance may help

The Cloud Security Alliance is trying to cut through the myriad zero-trust approaches and solutions out there and attempt to offer some practical info for corporate network admins.

Zero-trust security continues to be one of the hottest marketing phrases in an industry that loves its buzzwords. But despite so many so-called zero trust products from virtually every vendor, there’s still a lot of confusion about what a zero-trust architecture looks like and how to deploy its key elements across an organization.

A new Cloud Security Alliance project called the Zero Trust Advancement Center aims to cut through the clutter. Launched this week with vendors CrowdStrike, Okta, and Zscaler, the initiative aims to advance standards, certifications, and best practices to help folks build zero-trust environments.

“The internet is becoming the new network,” said Kavitha Mariappan, EVP of customer experience and transformation at Zscaler. “Applications are moving to the cloud. Cloud is becoming the new data center. So why is anyone focusing on securing the physical network? This legacy network security model needs to be turned on its head.”

Over the next 18 months, the group will roll out educational courses covering zero-trust architecture and strategy, a webinar series, research papers, practitioner and executive zero-trust certification programs, and it will host a zero-trust summit slated for the fourth quarter of 2022. 

Additionally, it will conduct a survey on CISO perspectives about deploying zero trust and release the results at the CxO Trust Summit held during the RSA Conference in June. 

Trust no one

A zero-trust security framework essentially boils down to trusting no one on the network, let alone anyone connecting in from the outside, and assuming there has been a security breach. Instead of trusting employees or other users, devices, and networks by default, zero trust relies on identity and behavior to verify users and machines in real time, and restricts data and access on a least-privilege basis.

This approach becomes increasingly important as miscreants use stolen credentials and identities to bypass security, and access corporate systems. Once they are in, they can typically freely move laterally through the network, steal files, and cause other mayhem.

“There’s a misperception that stopping malware means stopping the breach,” CrowdStrike co-founder and CEO George Kurtz said in a memo about the Zero Trust Advancement Center.

“It’s important but not enough, because adversaries are increasingly launching attacks that are malware-free,” he continued, citing the CrowdStrike 2022 Global Threat Report. It found 62 percent of all attacks are malware-free and use hands-on-keyboard activity. 

“In the modern enterprise, our user identities and credentials are intertwined with the devices we use, the cloud services we access and the data that flows across all of them,” Kurtz said.

“This intersection is where enterprise risk is coalescing. Zero-trust security strategies hold tremendous promise for securing infrastructure and data in today’s modern enterprise, but this will require the industry to make significant strides toward realizing its promise.”

‘No zero-trust box’

This is where the non-profit industry body Cloud Security Alliance fits in, according to Mariappan. While it was important to bring together leaders in three core tenets of zero-trust security — Okta with its identity and access management, CrowdStrike for its endpoint and device security, and Zscaler with its policy enforcement and management — it was even more important to house the center in a vendor-neutral organization, she said.

“This is what CSA stands for,” Mariappan said. “Their foundational mission is vendor neutral awareness and education. They are best-of-breed in doing that, and they have the credibility and the reputation of having done this for over a decade.”

Despite claims to the contrary from some vendors and products, “there’s no such thing as a zero-trust box,” she added. “It’s an ecosystem of solutions that are integrated to enable those key elements” including identity, device posture, and policy enforcement.

The Zero Trust Advancement Center will build on existing CSA projects, including the Software-Defined Perimeter research series, Cloud Controls Matrix, Enterprise Architecture, and other virtualized security models. 

And one of its first action items will be to produce “the seminal white paper” that defines a zero-trust architecture, Mariappan said. “So we all have a rubric as an industry to evaluate anyone or anything that says that it is zero trust,” she explained. 

This should also help address security practitioners’ biggest challenges as their business shifts to the cloud, mobile users and devices proliferate, organizations’ attack surface expands, and attackers become more active and sophisticated. 

“The challenges that they’re facing is how do we continue to deliver on the organization’s business mandate,” Mariappan said. “We have organizational goals to drive profitability, keep the crown jewels, intellectual property safe, keep our employees safe, and at the same time, continue to innovate and protect the reputation of the company.”

It’s a daunting task, especially when security teams are tasked with supporting 300,000 employees spread across several countries with varying local regulations and levels of training, she added. 

“This is a big problem to solve, and the last thing they want to deal with is different vendors pitching their wares,” Mariappan said. “They want they want to be educated, they want to hear from their peers, how others have solved these problems, the best practices, the blueprints, use cases and stories from the trenches. And they want to keep the organization safe.” ®

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
Exclusive New Year Discounts: Buy Office and get Windows for free thumbnail

Exclusive New Year Discounts: Buy Office and get Windows for free

Новогодишната разпродажба е един от най-добрите моменти за пазаруване с големи намаления на някои от най-популярните софтуерни продукти. Възползвайте се от най-изгодните оферти за годината на Keysfan.com! Разгледайте предложенията за MS Office и операционната система Windows. Има разнообразни оферти с отстъпки, от които да избирате. Кампанията включва пакетите MS Office от най-новата версия – MS…
Read More
Three "Science" published together, scientists have a new understanding of the incidence of cancer thumbnail

Three “Science” published together, scientists have a new understanding of the incidence of cancer

很多癌症都和基因突变有关,因此许多科学家们也在DNA的层面上寻找癌症发生的原因,探索DNA上的哪些异常会导致癌症。但这个看待癌症的角度可能已经落伍了。今日《科学》杂志一口气发表了三篇重磅研究论文,使得我们能超越DNA,对癌症产生全新的认知。“这是癌症研究的一个全新方式。”共同领导这些研究的Nevan Krogan教授兴奋地说道。 研究人员们指出,我们的基因不过是细胞合成蛋白质的指南。真正在人体里起到生理作用的,那还得是这些蛋白质。不同的蛋白质在身体里有时候会相互结合,形成复合体,调节各种功能。基因突变之所以会引起疾病,很大程度上是因为会影响到这些蛋白质的功能。"=""color=>这个观点能让我们更好地理解癌症如何发生。比如说在身体里,有两个蛋白质会形成一个关键的复合体,修复受损的DNA。而一旦编码这两个蛋白质的基因上出现了什么变异,这两个蛋白质的结构就可能出现变化。如果这些变化让它们无法相互作用,就无法形成蛋白复合体来修复DNA。"=""color=>可以想象,久而久之,细胞里的受损DNA就会越积越多,最终发生质变,引起癌症。既然如此,我们能否基于对已知致癌突变的理解,将目光聚焦于蛋白质的相互作用,重新理解癌症的发生呢?这正是该团队所做的工作。首先,他们从头颈癌和乳腺癌中找到了近60条最常出现变化的基因,分析它们的蛋白产物能形成怎样的复合体。同时,研究人员们也使用健康细胞里的复合体作为对比。这样一来,我们就能知道在癌细胞里,这些蛋白复合体究竟出现了怎样的变化。"=""color=>在头颈癌(也是全球第六大恶性癌症)中,科学家们总共揭示了771个蛋白之间的相互作用,其中84%是全新发现。这些发现有助于我们理解抗癌药物是否能起效,比如常见的癌症相关蛋白PIK3CA会结合HER3受体酪氨酸激酶,而不同的突变会影响两者之间的结合。于是虽然药物针对的都是HER3,但PIK3CA上的一些突变会让药物生效,另一些突变反而会让药物失效。"=""color=>此外,一类全新的蛋白相互作用也引起了科学家的关注——他们发现FGFR酪氨酸激酶3与Daple蛋白之间也会出现相互作用,从而激活下游通路,促进癌细胞的转移。这就带来了全新的治疗思路,比如通过FGFR抑制剂来抑制癌症的转移。"=""color=>而在乳腺癌里,他们找到的蛋白质相互作用中,同样有79%是全新发现。有意思的是,同样是常见的PIK3CA突变,在乳腺癌里,科学家们发现它还能结合两个其它蛋白。这也表明即便是同一种癌症相关蛋白,在不同细胞里也会具有不同的功能,激活不同的信号通路。"=""color=>此外,研究人员们还发现了常见乳腺癌相关蛋白BRCA1会与一种叫做UBE2N的蛋白进行结合。这一发现有望让我们知道,目前的一类乳腺癌治疗药物是否会起作用。“这些细节能告诉我们现有的药物能起到怎样的疗效,或是解释为何药物不起效。”这些研究的另外一名负责人Trey Ideker教授说道。"=""color=>为了更好地服务整个癌症研究领域,研究人员们将这些蛋白相互作用的数据与公开数据库里的数据进行了整合,构建了一个全新的工具,便于其它研究者分析和验证。他们相信,这一工具有望让我们更好地认识致癌基因/蛋白的作用,并找到潜在的治疗靶点。"=""color=>我们也期望这些科学突破能早日得到转化应用,造福更多癌症患者!
Read More
Pixel 6, Paris, Netflix: Autofreies Paris und 4. Staffel von Stranger Things thumbnail

Pixel 6, Paris, Netflix: Autofreies Paris und 4. Staffel von Stranger Things

Cookies zustimmen Besuchen Sie Golem.de wie gewohnt mit Werbung und Tracking, indem Sie der Nutzung aller Cookies zustimmen. Details zum Tracking finden Sie im Privacy Center. Skript wurde nicht geladen. Informationen zur Problembehandlung finden Sie hier. Um der Nutzung von Golem.de mit Cookies zustimmen zu können, müssen Cookies in Ihrem Browser aktiviert sein. Weitere Informationen…
Read More
Wear Hue App: Smarte Lampen per Wear OS-Uhr steuern thumbnail

Wear Hue App: Smarte Lampen per Wear OS-Uhr steuern

Mit Wear OS smarte Lampen von Philips Hue steuern, erfordert weiterhin Drittanbieter-Apps. Es gibt eine neue interessante Alternative. Es gibt eine neue Wear OS-App für Hue-Lampen. Sie ist simpel und perfekt zur Hue-Bedienung. Etwas mehr als einen Euro muss sie euch wert sein. Habt ihr ein smartes Zuhause mit Hue-System integriert und eine Smartwatch am…
Read More
As Expected, Yet Another Star Trek Show Is Incoming thumbnail

As Expected, Yet Another Star Trek Show Is Incoming

Starfleet Academy as it looked in the 2380s.Screenshot: CBS/Paramount+Back in 2019, io9 did a round-up of all the Star Trek shows that were then in various stages of boldly going to CBS All Access. A couple years later, CBS All Access is now Paramount+, but studio’s keen interest in giving viewers as much Trek as…
Read More
Index Of News
Total
0
Share