Why Zero Trust must be an essential part of cybersecurity strategy

Issue 5 2023 Access Control & Identity Management

In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could say this can be likened to a castle surrounded by a moat. Authorised users could cross this perimeter and move freely within the network.

Today, the world is even more connected and complex. Cyberattacks have evolved, becoming increasingly creative, dynamic and mostly unpredictable – albeit great advances in prevention and detection technologies have taken place. Cyber criminals have access to advanced technologies and operate at an unprecedented scale, rendering traditional defences insufficient. To counter these threats, organisations must deploy machine-driven defences to match the capabilities of the attackers.


Paul Meyer.

Digital transformation has brought about significant changes in the way businesses operate; data flows constantly, and employees work remotely using multiple devices. Today's cybersecurity challenges are further exacerbated by the growing attack surface. Employees use their personal devices for work, further endorsing the need for new security measures. Additionally, the rise of cloud computing has made enterprise infrastructure more distributed and harder to protect using traditional perimeter strategies.

Unfortunately, this increased connectivity also means an expanded threat landscape. Major data breaches have become commonplace, affecting various industries and causing significant financial losses. One report notes that on average, 150 000 records were compromised per breach to date in 2023, while 2022 saw an average of 75 000 records compromised per breach, meaning that each breach has had a greater impact on organisations and individuals.

Thinking that dates to the Middle Ages doesn’t work

The classic castle-and-moat approach to security, where internal users are trusted and external threats are presumed, is no longer viable. Threat actors can dwell inside a network for extended periods, remaining undetected. Moreover, human error and insider threats pose additional risks. The need for a new security paradigm has never been more apparent.

The Zero Trust model emerges as the solution to these evolving threats. It entails questioning trust assumptions and implementing strict access controls across all network elements. No user or device is inherently trusted, and verification occurs continually.

This approach ensures that potential threats are detected and mitigated promptly, even within the network, and it provides enhanced security for devices both inside and outside the traditional perimeter. Yesterday's strategies are no match for today's threats, necessitating a complete reboot of cybersecurity practices. As cybersecurity risks continue to grow and attackers become more sophisticated, organisations must adopt a proactive and adaptable Zero Trust security strategy to safeguard their data, systems, and overall digital infrastructure.

However, every silver lining has a cloud attached to it.

Navigating the roadblocks

As the threat landscape evolves, enterprises are increasingly recognising the need for a Zero Trust approach to bolster their cybersecurity defences. However, making the transition to a Zero Trust model is far from a walk in the park for most organisations.

One of the primary hurdles to overcome is dealing with legacy systems and technical debt, which can impede progress and leave critical vulnerabilities exposed.

Legacy applications, networks, and protocols that once served enterprises well are now proving to be a hindrance in the face of modern cybersecurity challenges. These systems were not designed with the agility and robust security measures required in today's digital age. Reworking these aging infrastructures demands significant efforts, resources, and financial investments, exacerbating what is commonly referred to as ‘technical debt’. Essentially, the older the systems, the more burdensome it becomes to implement necessary changes.

An inherent limitation of legacy enterprise applications lies in their lack of a ‘least privilege’ concept. Many of these applications rely on outdated authentication models, such as single sign-on, which falls short of the rigorous standards set by the Zero Trust approach. Integrating them with other critical technologies, like Identity and Access Management (IAM) or endpoint security, can prove to be an arduous task.

Unfortunately, legacies are not the end of the issue but rather the tip of the iceberg. In my second article in this series, I will expand further on the barriers to Zero Trust implementation which are far outweighed by the benefits.

Paul Meyer is a Security Solutions Executive at iOCO Tech. He has over two decades of experience in IT Security technology covering application, identity, perimeter and endpoint security. He commenced his career as a Security Engineer Team Lead and has held senior positions with multiple security vendors and ICT service providers in South Africa.

In May 2022, Paul was appointed to the role of Security Solutions Executive at iOCO, where he is responsible for identifying, learning and bringing security solutions to market. The role is strongly focused on technically supporting the sales process and managing vendor relations.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Visitor management views
Entry Pro ATG Digital Technews Publishing SMART Security Solutions Access Control & Identity Management Residential Estate (Industry)
Visitor management is always changing, taking technology and legislation into account. SMART Security Solutions examines the latest trends with input from ATG Digital and Entry Pro.

Read more...
Securing your estate beyond the gate
ATG Digital Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
Protecting gated communities and lifestyle estates requires a modern, intelligent approach. A truly intelligent system protects both physical and digital perimeters, it must be a fully integrated ecosystem.

Read more...
Reliability, innovation and flexibility
Entry Pro Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Through constant innovation and advancement in technology and systems, Entry Pro strives to provide its clients with not only the most suitable, but also the most advanced solution.

Read more...
Smarter security with automated visitor management
LD Africa Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Automated visitor management solutions, like LD Access, are transforming this process by reducing human workload, while enhancing security and efficiency.

Read more...
Paxton enhances installer loyalty programme
Paxton Access Control & Identity Management News & Events
Paxton has made it easier for security installers to benefit from its popular loyalty programme, Paxton Rewards, with points now added automatically when purchasing through approved distribution partners.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Rethinking access control in high-risk logistics environments
ATG Digital Access Control & Identity Management Transport (Industry) Logistics (Industry) Facilities & Building Management
South Africa’s logistics sector is under constant pressure, not only from external threats like hijackings and cargo theft, but also from internal vulnerabilities, operational blind spots, and limited support.

Read more...
Nice unveils MyNice Smartgo
News & Events Access Control & Identity Management
Nice SA has announced the release of MyNice Smartgo, a compact access automation solution, designed specifically for the South African market, combining an easy-to-install device with a user-friendly smartphone application.friendly smartphone application.

Read more...
Secure, touchless access control
Access Control & Identity Management Products & Solutions Commercial (Industry)
Invixium has joined forces with SAP to deliver a touchless access control experience for the S.Mart Store, SAP’s first fully automated, 24/7 self-service retail outlet, located at its global headquarters in Walldorf, Germany.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.