Powered by Ceros

What is Zero Trust? 

Previous

Girls4Tech

Next

Threatcasting

Zero Trust is a security strategy founded on this principle: You must assume the breach of your network. 

A threat actor who has infiltrated your once-thought-of-as-safe corporate environment tries their best to move across it, exfiltrate data and take down services — everything that keeps a CISO up at night.

Here are some guidelines you can follow:

At Mastercard, we are investing in best practices from groups like CISA,

the U.S. government’s Cybersecurity and Infrastructure Security Agency, which has published well-known examples of using Zero Trust.

Focus on the data

Define your conditions

Put the pieces together

Communication is key

Focus on the data

Define your conditions

Put the pieces together

Communication is key

The amount of friction involved in accessing data should directly correlate to its level of sensitivity. That way, users will more likely accept the new guardrails. 

Focus on the data

Define your conditions

Put the pieces together

Communication is key

After developing a classification model, you must then define conditions on accessing the data. This means using the 4 Ws: who, what, when and where.

Highly confidential data, for instance, may be defined as
accessible only from corporate-managed devices, from users who have installed multifactor authentication or from certain jurisdictions. It is highly important that you coordinate these specific requirements with the data owners and your legal departments where necessary. 

Focus on the data

Define your conditions

Put the pieces together

Focus on the data

Define your conditions

Put the pieces together

Communication is key

Home

Threatcasting

Threatcasting

BIN attacks

BIN attacks

CISO Lessons

CISCO lessons

Ransomware

Ransomware

The Trust Center

The Trust Center

Power of STEM

Power of STEM

Zero Trust

Zero trust

Zero Trust calls for organizations to assume that any request for access is from a threat actor — perhaps one who has already crossed the moat, entered the castle and impersonated an employee.  

Gone are the days of the “castle and moat,” where access is allowed blindly from anywhere within the confines of your network. 

Under the Zero Trust model, organizations evaluate access to systems or data based on sources that provide more context around who is accessing what from where.