{"id":44590,"date":"2021-04-16T10:00:00","date_gmt":"2021-04-16T14:00:00","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=44590"},"modified":"2022-04-02T11:41:26","modified_gmt":"2022-04-02T15:41:26","slug":"cloud-model-zero-trust-security","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/cloud-model-zero-trust-security","title":{"rendered":"A Cloud-Based Model for Zero Trust Security"},"content":{"rendered":"\n
Traditional views of network security are constantly challenged by developments in the world of hacking and with modern, cloud-based innovations. Although organizations previously felt securing the perimeter around IT infrastructure was enough, technological innovations have made this strategy obsolete. That doesn\u2019t even take into consideration the disparate locations and ways that end users are working today with the global pandemic (still) underway. <\/p>\n\n\n\n
A cloud-based model for a new framework, zero trust security<\/a>, makes it possible to secure access to IT resources for users and devices in ways perimeter-based security cannot. It\u2019s also a more strategic way of securing infrastructure for three primary reasons:\u00a0<\/p>\n\n\n\n This approach ensures only authorized users may be granted access to resources with devices that are secure and through connections that are deemed safe. Below we will discuss the true meaning of zero trust security, and how it protects cloud-based IT environments.<\/p>\n\n\n\n John Kindervag developed the concept of zero trust security \u2013\u2013 also referred to as zero trust network architecture \u2013\u2013 in 2010. It was designed to oppose the conventional view of perimeter-based security by treating all network traffic as a potential threat. In order to ward off modern cyberthreats, zero trust security requires that all traffic within an organization\u2019s IT infrastructure is verified, so IT teams always know who is accessing what and when.\u00a0<\/p>\n\n\n\n Perimeter-based security was designed to operate best with on-prem infrastructure, protecting an organization\u2019s network with a hard \u201cshell\u201d and leaving internal resources unprotected. With the rise in popularity of cloud-based infrastructure and web applications, zero trust security controls access to all resources, regardless if they\u2019re on-prem or in the cloud.<\/p>\n\n\n\n Zero trust security ensures that every access transaction – the core of what IT provides and what end users do – is safe and secure. Each access transaction that follows zero trust principles verifies identity, device, network, and least privileged access all while monitoring every step. <\/p>\n\n\n\n Zero trust security addresses today\u2019s IT infrastructure needs. Data is stored in the cloud, and applications and networks are hosted through it as well. Organizations are moving their resources to cloud-based infrastructure and software-as-a-service providers.<\/p>\n\n\n\n This method of securing resources verifies and authenticates every user, monitors and limits all network traffic, and secures credentials through layered authentication. Devices are locked down, and only the correct users are authenticated to those devices. Regarding networks, IT teams can use VLAN segmentation to divide who has access to what resources, or users can employ VPNs to keep their network connection secure. Geofencing by location and by IP<\/a> are also available to more tightly control network access.<\/p>\n\n\n\n Additionally, implementing zero trust security through cloud-based architecture is more cost-effective and flexible for organizations of any size or type. Without the associated upkeep of on-prem hardware and significant integration, IT teams can enjoy increased security without sacrificing ease of use. <\/p>\n\n\n\n Leveraging a cloud-based model for zero trust security arms organizations against the pervasive cyberthreats that continue to evolve in complexity and creativity. These security tools should be included in modern identity and access management (IAM) so that organizations can take the guesswork out of securing their infrastructure.<\/p>\n\n\n\nWhat is Zero Trust Security?<\/h2>\n\n\n\n
Why Use Zero Touch Security in the Cloud?<\/h2>\n\n\n\n
A Cloud-Based Model for Zero Trust Security<\/h2>\n\n\n\n