Zero Trust Against Nation-State Attacks: Expert Explains What It Is Vital

Nation-state cyber-attacks have never been more complex than they are right now. The fallout of the SolarWinds breach continues to reverberate across the industry, and the conversation is shifting to how to mitigate and defend against the next attack on this scale.

There is no silver bullet for the insidious nature of supply chain attacks. However, a Cybersecurity expert outlines the imperative need for Zero Trust solutions as a central part of detecting and mitigating nation-state attacks.

Subscribe
Notify of
guest
1 Expert Comment
Most Voted
Newest Oldest
Inline Feedbacks
View all comments
Dmitriy Ayrapetov
Dmitriy Ayrapetov , Vice President Platform Architecture
InfoSec Expert
January 6, 2021 11:57 am

<p>What the latest attack demonstrates is that a sufficiently dedicated and resourced attacker, such as a nation-state attacker, will always find a way to get in. Assuming that someone is already in an organization’s network is a mindset that is key to successfully modeling for network and infrastructure security. Questions IT managers should be consistently asking themselves are, ‘How do you reduce the impact of such powerful attacks?’, ‘What is the best way to detect them and ultimately kick them out?’</p> <p>&nbsp;</p> <p>Zero Trust network design is a principle that helps with the first point – reducing the impact of an attack – by containing the attacker and limiting their lateral movement. As an example, in a fully permissive and open network, an attacker that obtains a foothold on a regular employee’s machine has open access to attempt exploits on privileged machines on the network. This can be accomplished virtually undetected, leaving the attacker to gradually embed themselves deeper into an organization.</p> <p>&nbsp;</p> <p>On the other hand, a Zero Trust network will make an adversary work harder, significantly tripping more alarms and increasing the opportunity for detection by forcing the attacker to cross more “gates” via impersonation or other techniques.</p>

Last edited 1 year ago by Dmitriy Ayrapetov
Information Security Buzz
1
0
Would love your thoughts, please comment.x
()
x