What is Zero Trust?
Previous
Girls4Tech
Next
Threatcasting
Zero Trust is a security strategy founded on this principle: You must assume the breach of your network.
A threat actor who has infiltrated your once-thought-of-as-safe corporate environment tries their best to move across it, exfiltrate data and take down services — everything that keeps a CISO up at night.
Here are some guidelines you can follow:
At Mastercard, we are investing in best practices from groups like CISA,
the U.S. government’s Cybersecurity and Infrastructure Security Agency, which has published well-known examples of using Zero Trust.
Focus on the data
Define your conditions
Put the pieces together
Communication is key
Focus on the data
Define your conditions
Put the pieces together
Communication is key
The amount of friction involved in accessing data should directly correlate to its level of sensitivity. That way, users will more likely accept the new guardrails.
Focus on the data
Define your conditions
Put the pieces together
Communication is key
After developing a classification model, you must then define conditions on accessing the data. This means using the 4 Ws: who, what, when and where.
Highly confidential data, for instance, may be defined as accessible only from corporate-managed devices, from users who have installed multifactor authentication or from certain jurisdictions. It is highly important that you coordinate these specific requirements with the data owners and your legal departments where necessary.
Focus on the data
Define your conditions
Put the pieces together
Focus on the data
Define your conditions
Put the pieces together
Communication is key
Home
Threatcasting
Threatcasting
BIN attacks
BIN attacks
CISO Lessons
CISCO lessons
Ransomware
Ransomware
The Trust Center
The Trust Center
Power of STEM
Power of STEM
Zero Trust
Zero trust
Zero Trust calls for organizations to assume that any request for access is from a threat actor — perhaps one who has already crossed the moat, entered the castle and impersonated an employee.
Gone are the days of the “castle and moat,” where access is allowed blindly from anywhere within the confines of your network.
Under the Zero Trust model, organizations evaluate access to systems or data based on sources that provide more context around who is accessing what from where.