Now, Zero Trust security<\/a> is becoming the new business standard for reliable security in a work-from-anywhere environment \u2014 and these environments are powered in part by mobile devices. How can Zero Trust account for personal devices that have become notorious security weak points in organizations? <\/p>\n\n\n\n
BYOD environments have earned themselves a poor reputation for security because they\u2019ve historically functioned in perimeter-based security environments. In these environments, the organization protects its resources by creating a firewall-based perimeter around the central network.<\/p>\n\n\n\n
It verifies entry onto the network with checks like username\/password combos to verify identity and IP addresses to verify devices, but that verification step generally occurs only once. Further, authenticating at the perimeter grants access to everything<\/em> \u2014 so one successful breach would grant the bad actor access to the entire corporate network. <\/p>\n\n\n\n
Additionally, passwords provide weak-at-best security<\/a>, and IP addresses fall short when it comes to verifying individual mobile devices. And with cyber threats being as sophisticated as they are, most security experts recommend planning for when <\/em>they happen, not if <\/em>\u2014 allowing anyone to move freely inside the network once authenticated opens the door to lateral movement in case of a breach. <\/p>\n\n\n\n
If IT admins can\u2019t see the devices on the network, they can\u2019t monitor their activity to detect suspicious behavior, address security noncompliance, or remove unprotected devices from the network. <\/p>\n\n\n\n
In general, lack of visibility into devices on the network prevents IT from getting a full view of the organization\u2019s network and activity. This can create major blind spots. <\/p>\n\n\n\n
On unmanaged BYOD devices, IT admins can\u2019t enforce security policies like passcode requirements, multi-factor authentication<\/a> (MFA), antivirus protection, or software updates. This means that devices with significant vulnerabilities could be accessing corporate resources, creating exploitable attack vectors.<\/p>\n\n\n\n
Exposing corporate data to unapproved and unprotected resources could allow sensitive data to be tampered with or compromised. In addition to the dangers of connecting third-party applications and data with corporate resources, this can also cause compliance risks \u2014 especially when personal identifiable information (PII) is involved.<\/p>\n\n\n\n
Mobile devices that aren\u2019t associated with the organization don\u2019t provide IT with telemetry. This can obscure IT\u2019s ability to investigate issues.<\/p>\n\n\n\n
Zero Trust security emerged in response to the perimeter security model\u2019s inability to protect decentralized infrastructures, cloud-based technology, and mobile devices. It gained significant ground in the last few years as companies that had shifted to remote work models turned to Zero Trust for more effective security. Now, it\u2019s considered the most effective way to secure a modern, work-from-anywhere environment. <\/p>\n\n\n\n
\u201cZero trust is a response to enterprise network trends that include remote users, bring your own device (BYOD), and cloud-based assets that are not located within an enterprise owned network boundary.\u201d<\/p>\u2014 NIST SP 800-207<\/a><\/cite><\/blockquote>\n\n\n\n
What Does Zero Trust Prescribe for BYOD Security?<\/strong><\/h2>\n\n\n\n
Device security is an integral part of a successful Zero Trust security program: in Forrester\u2019s Practical Guide to a Zero Trust Implementation<\/a>, it names device security as one of the five main categories of Zero Trust. <\/p>\n\n\n\n
- See and monitor all devices accessing corporate resources.<\/li>
- Isolate or remove devices from the network.<\/li>
- Specify required configurations for devices to be able to access corporate resources. Examples of common configurations include requiring a passcode, enabling remote lock and wipe, and requiring the operating system (OS) to be up to date.<\/li><\/ul>\n\n\n\n
BYOD environments are best managed according to Zero Trust principles with a mobile device management (MDM<\/a>) tool. MDM tools allow IT to manage the devices on their network \u2014 organizations with BYOD environments should look for MDM solutions with optional enrollment policies that enable employees who want to use their personal devices to enroll them into the MDM program. This helps garner trust and maintain employee autonomy.<\/p>\n\n\n\n
- Requiring a passcode.<\/li>
- Adding web shortcuts to the home screen.<\/li>
- Creating custom configuration for policies, applications, and profiles. <\/li>
- Being able to lock and wipe the device remotely.<\/li><\/ul>\n\n\n\n
These measures significantly reduce the risk that employee-owned devices bring onto the network. Note that mobile device management solutions<\/a> are even more secure when combined with an identity and access management (IAM)<\/a> tool, allowing user and device identities and policies to work in tandem for higher, more contextualized security. <\/p>\n\n\n\n
Building Out Your Zero Trust Roadmap<\/strong><\/h2>\n\n\n\n
Device management<\/a> is one of five categories of a Zero Trust implementation. For a step-by-step look at securing the devices in your environment as well as implementing the other four categories of Zero Trust \u2014 identities, workloads, networks, and data \u2014 download Forrester\u2019s Practical Guide to a Zero Trust Implementation.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"