Why Zero Trust must be an essential part of cybersecurity strategy

Issue 5 2023 Access Control & Identity Management

In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could say this can be likened to a castle surrounded by a moat. Authorised users could cross this perimeter and move freely within the network.

Today, the world is even more connected and complex. Cyberattacks have evolved, becoming increasingly creative, dynamic and mostly unpredictable – albeit great advances in prevention and detection technologies have taken place. Cyber criminals have access to advanced technologies and operate at an unprecedented scale, rendering traditional defences insufficient. To counter these threats, organisations must deploy machine-driven defences to match the capabilities of the attackers.


Paul Meyer.

Digital transformation has brought about significant changes in the way businesses operate; data flows constantly, and employees work remotely using multiple devices. Today's cybersecurity challenges are further exacerbated by the growing attack surface. Employees use their personal devices for work, further endorsing the need for new security measures. Additionally, the rise of cloud computing has made enterprise infrastructure more distributed and harder to protect using traditional perimeter strategies.

Unfortunately, this increased connectivity also means an expanded threat landscape. Major data breaches have become commonplace, affecting various industries and causing significant financial losses. One report notes that on average, 150 000 records were compromised per breach to date in 2023, while 2022 saw an average of 75 000 records compromised per breach, meaning that each breach has had a greater impact on organisations and individuals.

Thinking that dates to the Middle Ages doesn’t work

The classic castle-and-moat approach to security, where internal users are trusted and external threats are presumed, is no longer viable. Threat actors can dwell inside a network for extended periods, remaining undetected. Moreover, human error and insider threats pose additional risks. The need for a new security paradigm has never been more apparent.

The Zero Trust model emerges as the solution to these evolving threats. It entails questioning trust assumptions and implementing strict access controls across all network elements. No user or device is inherently trusted, and verification occurs continually.

This approach ensures that potential threats are detected and mitigated promptly, even within the network, and it provides enhanced security for devices both inside and outside the traditional perimeter. Yesterday's strategies are no match for today's threats, necessitating a complete reboot of cybersecurity practices. As cybersecurity risks continue to grow and attackers become more sophisticated, organisations must adopt a proactive and adaptable Zero Trust security strategy to safeguard their data, systems, and overall digital infrastructure.

However, every silver lining has a cloud attached to it.

Navigating the roadblocks

As the threat landscape evolves, enterprises are increasingly recognising the need for a Zero Trust approach to bolster their cybersecurity defences. However, making the transition to a Zero Trust model is far from a walk in the park for most organisations.

One of the primary hurdles to overcome is dealing with legacy systems and technical debt, which can impede progress and leave critical vulnerabilities exposed.

Legacy applications, networks, and protocols that once served enterprises well are now proving to be a hindrance in the face of modern cybersecurity challenges. These systems were not designed with the agility and robust security measures required in today's digital age. Reworking these aging infrastructures demands significant efforts, resources, and financial investments, exacerbating what is commonly referred to as ‘technical debt’. Essentially, the older the systems, the more burdensome it becomes to implement necessary changes.

An inherent limitation of legacy enterprise applications lies in their lack of a ‘least privilege’ concept. Many of these applications rely on outdated authentication models, such as single sign-on, which falls short of the rigorous standards set by the Zero Trust approach. Integrating them with other critical technologies, like Identity and Access Management (IAM) or endpoint security, can prove to be an arduous task.

Unfortunately, legacies are not the end of the issue but rather the tip of the iceberg. In my second article in this series, I will expand further on the barriers to Zero Trust implementation which are far outweighed by the benefits.

Paul Meyer is a Security Solutions Executive at iOCO Tech. He has over two decades of experience in IT Security technology covering application, identity, perimeter and endpoint security. He commenced his career as a Security Engineer Team Lead and has held senior positions with multiple security vendors and ICT service providers in South Africa.

In May 2022, Paul was appointed to the role of Security Solutions Executive at iOCO, where he is responsible for identifying, learning and bringing security solutions to market. The role is strongly focused on technically supporting the sales process and managing vendor relations.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...