Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

1 month ago

Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, information objects and the NIST model for unreality and on-prem environments.

AUTHOR: Mohit Tiwari, CEO and Co-Founder, Symmetry Systems

Compromised credentials and identities, third-party breaches, API attacks, and exertion exploits are each foundational introduction points for today’s hackers.

Recent months person brought galore high-profile breaches from Samsung and Nvidia to Okta and the continued aftermath of Log4j. Still, ultimately, these attacks are each symptoms of the aforesaid problem: organizations bash not person visibility into however their information objects are protected and used.

Until information teams tin reply successful real-time what information they have, who has entree to it, and however it is being used, organizations volition proceed to neglect successful rapidly communicating the grade of breaches wrong the cloud.

When Samsung confirmed the Lapsus$ hacking radical had obtained and leaked astir 200 gigabytes of confidential data, the archetypal question for customers was whether oregon not their customers’ information was a portion of that statistic oregon if Samsung had safeguards successful spot to support them.

Fortunately, Samsung said that nary customers’ idiosyncratic accusation was compromised. However, erstwhile Okta was breached by the aforesaid hacking radical conscionable a fewer weeks later, their information squad had trouble communicating the blast radius due to the fact that they could not seamlessly pinpoint the determination and privileges of each the information wrong their ecosystem. This benignant of hold tin pb to increasing distrust wrong the broader endeavor assemblage arsenic information teams scramble to place the afloat scope of the breach.

With truthful overmuch astatine stake, an expanding fig of organizations are choosing the Zero Trust Security model, which assumes that untrusted users beryllium connected some sides of an organization’s computing perimeter.

Zero Trust principles – whether applied to identities, network, oregon information objects – assistance organizations systematically amended information risks passim each of visibility, detection, response, and protection. However, successful the modern enterprise, implementing Zero Trust for information without breaking concern logic is simply a caller absorption that requires a cautious displacement from Posture Management to Detection-Response to Protection to debar creating concern hazard oregon outage.

As the conception of Zero Trust continues to evolve, determination are a fewer applicable ways that organizations tin statesman eliminating hazard erstwhile they person improved visibility and recovered a solution that works wrong their unreality oregon on-prem environment. The United States’ National Institute of Regulations and Technology (NIST), which has released a fig of unreality information standards that instrumentality into relationship overlapping national regulations, including HIPAA and the Federal Information Security Management Act (FISMA), is besides a large notation point. It provides supplemental materials and details that update organizations astir however the controls coincide and collaborate with different wide accepted standards and frameworks. The NIST exemplary incorporates the pursuing framework:

Visibility into Security Posture: 

When companies person visibility into their information information posture, they are capable to find and acceptable policies for enhanced information extortion crossed cloud-based organizations to assistance them amended find however information objects should beryllium treated. Data Security Posture Management (DSPM) tools are a bully starting constituent for your Zero Trust journey.


Many captious identities and work roles needfully request permissions to ample swaths of information to bash their occupation – privileged identities, applications that are fronts for databases oregon information lakes, and adjacent CI/CD etc. proviso concatenation bundle are each examples of these. Placing detection and effect seat-belts astir crown jewel information objects protects them from specified identities being mis-used done phishing oregon app-sec faults.


Organizations should make permissions and entitlements, contented cleanup campaigns, and acceptable up governance models to beryllium acceptable up to proactively hole to respond to detected cybersecurity incidents. These are longer word campaigns with large strategical worth and hence are informed by the fine-grained visibility into however information objects are utilized crossed antithetic concern functions.

Simply put, information is invaluable and an organization’s astir persistent asset. It is captious for organizations to wholly recognize wherever their secrets (IP) prevarication crossed their full unreality and on-prem environment. Where is your data? Who has entree to it, and is this entree monitored? Does your enactment support authorization implicit this information truthful excessive oregon dormant privileges tin beryllium revoked erstwhile necessary?

Answering these questions is foundational to a modern unreality information information strategy, particularly erstwhile faced with the situation of operationalizing entree power oregon information information without breaking concern logic. If near unanswered, organizations volition proceed to put clip and resources successful tangential protections astir networks and applications that permission important gaps for information to beryllium exploited oregon taken for ransom.

Infosec Insiders columnist Mohit Tiwari is the CEO and Co-Founder of Symmetry Systems

Enjoy further insights from Threatpost’s Infosec Insiders community by visiting our microsite.