Channel Eye
PPBF
  • Home
  • Business
    • Appointments
    • Data Protection
    • Digital & Technology
    • Environment
    • Features
    • Finance
    • Interviews & Profiles
    • Leadership
    • Legal & Professional Services
    • People
    • Property
    • Retail & Hospitality
    • Transport
    • Wellbeing
  • Lifestyle
    • Arts & Culture
    • Charity & Community
    • Food & Drink
    • Health
    • Home
    • Music
    • Leisure
    • Travel
  • Events
    • Events in Jersey
    • Events in Guernsey
    • Events in Alderney
    • Events in Isle of Man
    • Virtual events
    • All events
    • Past Events
  • Directory
  • Location
    • Jersey
    • Guernsey
    • Alderney
    • Isle of Man
  • Advertise
  • Subscribe
No Result
View All Result
Channel Eye
No Result
View All Result
PPBF
Home Business Digital & Technology

Feature: A new security approach for the new world of work

When zero trust is the best trust

December 3, 2020
in Business, Digital & Technology, Features, Guernsey, Isle of Man, Jersey
Office building at night
Share on LinkedInTwitterFacebookEmail

With the spread of Covid-19 throughout the world, millions of people have moved to remote work. Whilst not everybody has enjoyed working from home, a large percentage of people have seen the benefits of doing so.

The way we work has now changed forever. Many businesses have realised that they don’t require their entire workforce to be office based and that flexible, remote working can drive and accelerate productivity.

Enabling a team to work remotely however is an ongoing challenge that looks different for every organisation, depending on their size, industry, and stage of digital transformation. Every business needs to define their own priorities to enable remote productivity across their organisation’s workforce.

To accommodate this change in the new world of work, organisations need to rethink their security model. They require a security model that effectively adapts to the complexity of the modern environment and embraces the mobile workforce which has now become the normal for many businesses and will continue to be post pandemic.  It must protect people, devices, applications, and data wherever they are located.

Start with Zero Trust

Never trust, always verify

It is important to start your new security model with ‘zero trust’, based on the principle of never trust, always verify.

Each access request should be treated as though it originated from an uncontrolled network.  Every access request should be strongly authenticated, authorised within policy constraints, and inspected for anomalies before access is granted.  Everything from the user’s identity to the application’s hosting environment is used to verify the request and prevent breach.

Transitioning to Zero Trust is a multi-layered journey that can take time to achieve a high level of maturity.  Many security vendors however have designed frameworks to assist your business on this journey and are aligned to maturity models to track your progress.  Most follow very similar principles and are based on several foundational pillars that assist in protecting your business end-to-end, covering: Identity, Endpoints, Data, Apps, Infrastructure and Network. Each of these pillars are critical elements that need to be protected.

Microsoft’s Zero Trust Framework
Microsoft’s Zero Trust Framework

Managing Identity

The current pandemic has seen an explosion of cloud application adoption and the mobile workforce which has significantly redefined the security perimeter.  Data is being accessed outside the corporate network, so it is no longer feasible to rely on traditional network controls. These controls need to move to where the data is: on devices and inside apps.

A strong identity foundation makes it possible for users to securely access the resources and apps they need, from wherever they are.

But first, what is an identity?

An identity can represent a person, a user, it can be a service or an Internet of things (IOT) device.  Manging identities is one of the most powerful ways to control access to data.

In a Zero Trust security model, before an identity attempts to access a resource, organisations need to:

  • Verify the identity with strong authentication
  • Ensure access is compliant and typical for that identity
  • Follow least privilege access principles
What does ‘least privilege access principle’ mean?  The principle means giving a user (or a process) only the access which is essential to perform their function. For example, a user who usually does work entering financial transactions, does not need to be able to install software or create new user accounts.  Limiting access in this way reduces the risk of malevolent actions, whether intended or not.

Using tools such as Microsoft’s Azure Active Directory can provide a single identity management platform, allowing you to easily enable Multi-Factor Authentication (MFA).  MFA safeguards users credentials and gives you that additional layer of protection and with biometric technologies almost becoming standard on the devices we use today.

Conditional Access enables organisations to create risk-based policies applied to user, device or location to determine whether access to apps or data should be allowed, limited, or blocked. Providing users with a Single-Sign On (SSO) experience encourages tougher security measures as users don’t have to have different passwords to access all of the different apps they need whether they are using SaaS or on-premise apps.

Managing Devices

Unmanaged devices are a very attractive and powerful entry point for malicious parties, and it’s vital that only authorised and healthy devices can access applications and data. With more employees working from home and across devices, organisations need a strategy to support bring-your-own-device (BYOD) scenarios.

There are a few key rules for securing devices and endpoints in a Zero Trust model:

  • Zero Trust security policies are centrally enforced through the cloud and cover endpoint security, device configuration, app protection, device compliance, and risk posture.
  • The platform as well as the apps that run on the devices are securely provisioned, properly configured, and kept up to date.
  • There is automated and prompt response to contain access to corporate data within the apps in case of a security compromise.
  • The access control system ensures that all policy controls are in effect before the data is accessed

As mentioned above, Conditional Access plays a big role in protecting your organisation from the threat posed by unauthorised devices. Using risk-based policies, devices that don’t meet the required conditions are denied access.

Many tools exist to manage these external devices and ensure that enrolled devices have the right policies applied, for example that the device is encrypted with strong passwords and anti-virus is up to date etc.

 

As your organisation embraces the new world of work, it is important to rethink your security requirements, protecting your people, devices, applications and data no matter where they are located. A Zero Trust security model will enable you to manage your user’s identity and devices, protecting your critical elements and driving and accelerating productivity.


James-SolomonAuthor: James Solomon, Partner Alliance Manager, C5 Alliance

Tags: C5 AllianceMicrosoftSecurityThought leadership
ShareTweetShareSend
Channel Eye Team

Channel Eye Team

Related Posts

C5 Alliance donates £10,000 to Guernsey Mind
Charity & Community

C5 Alliance donates £10,000 to Guernsey Mind

February 21, 2023
Stewart Constantine
Digital & Technology

C5 Alliance achieves four new Microsoft Partner designations

November 23, 2022
Jersey Tech Awards
Digital & Technology

Fifth annual Jersey tech awards launched

October 14, 2022
Next Post
Katie Bellingham

Focusing on HR training success

Channel Eye Sales
PPBF
Channel Eye subscribe

Subscribe to our newsletter

Get the latest, no-nonsense, essential news and information direct to your inbox.
  • Home
  • Business
  • Lifestyle
  • Events
  • Directory
  • Privacy Policy
  • Contact
  • Advertise
  • Subscribe

© 2023 Channel Eye Limited

No Result
View All Result
  • Home
  • Business
    • Appointments
    • Data Protection
    • Digital & Technology
    • Environment
    • Features
    • Finance
    • Interviews & Profiles
    • Leadership
    • Legal & Professional Services
    • People
    • Property
    • Retail & Hospitality
    • Transport
    • Wellbeing
  • Lifestyle
    • Arts & Culture
    • Charity & Community
      • Macmillan
    • Food & Drink
    • Health
    • Home
    • Music
    • Leisure
    • Travel
  • Events
    • Events in Jersey
    • Events in Guernsey
    • Events in Alderney
    • Events in Isle of Man
    • Virtual events
    • All Events
    • Past Events
  • Directory
  • Location
    • Jersey
    • Guernsey
    • Alderney
    • Isle of Man
  • Advertise
  • Subscribe
  • Contact

© 2023 Channel Eye Limited

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.