The Zero Trust Approach for the Cloud

By Evin Safdia, Technical Marketing Manager, Prisma

The term “Zero Trust” has been around for almost 10 years, but it has recently picked up momentum as businesses look to proactively protect their data and infrastructure. With the shift to the cloud, Zero Trust is now a philosophy of choice for CIOs and CISOs, who are tasked with protecting their systems from outside attacks as well as from within the organization.

What Is Zero Trust?

Traditionally, network admins only needed to worry about protecting their organizations from outside threats. But the threat landscape has evolved. From zero-day malware to insider threats, network admins must now proactively protect networks and data to avoid breaches. With this evolution, the Zero Trust philosophy was born.

Zero Trust is based on the belief that trust should not be given to anyone or anything, no matter if they are within the network or outside. This “never trust, always verify” approach enforces least-privileged access in which, once users are authenticated and identified, continuous inspection is implemented on the traffic while the user is connected to the network. Simply assuming that a user connecting to the network and passing authentication requirements is in fact the user and not an attacker is not wise with the recent increase in the number and sophistication of breaches. In fact, a significant portion of hacking-related breaches still involve compromised and weak credentials – 29% according to the 2019 Verizon Data Breach Investigations Report .

To fully implement a Zero Trust approach, the following must be considered:

It is important to remember that secure access is not enough; constant inspection and prevention must be included to successfully enforce Zero Trust across your organization.

Extending Zero Trust to Cloud Environments

As the popularity of software-as-a-service (SaaS) applications and public cloud offerings has grown, so has the complexity of maintaining security and control over the data, traffic and users accessing the cloud. Zero Trust in the cloud requires complete visibility into the cloud apps, the data being stored and who is accessing the data. While securing the cloud may have become more complex, it is important that users are not impacted when accessing the cloud, no matter their location. If there are too many steps for users to gain access to apps or data in the cloud, they will bypass the secure way to access and find alternatives. Secure access is crucial for Zero Trust to work, and it must have minimal impact on users, especially those in remote locations or different offices.

To extend Zero Trust to the cloud requires security delivered from the cloud. Security from the cloud allows for policy enforcement, better protection and visibility into all internet traffic. By having users and offices connect directly to the cloud, instead of first going through headquarters or firewalls, your network and cloud architecture is simplified, and your overall attack vector is minimized.

There are several use cases where Zero Trust in the cloud can be applied:

Zero Trust Is a Strategy Not a Product

There is no one product that you can bolt on top of your existing security tools to enforce a Zero Trust approach. Zero Trust is a philosophy that must be thoroughly thought out and implemented across the entire organization, including at physical remote sites and users as well as in the cloud. Secure access is one ingredient in the Zero Trust philosophy. Ongoing traffic inspection is necessary to quickly identify and remediate threats. With constant traffic inspection, unusual user behavior and activity can alert network admins to a possible imposter or breach. Building your Zero Trust strategy can benefit your organization with:

Palo Alto Networks is revolutionizing the way companies transform their cloud security infrastructure. Prisma by Palo Alto Networks – the industry’s most complete cloud security suite – provides visibility and secure access into data, assets, apps, users and risks while enabling speed and performance. Prisma consistently governs access, protects data and secures applications as organizations move to the cloud. With Prisma, organizations can apply a Zero Trust approach to securely connect branch offices and mobile users to the cloud, confidently embrace the use of SaaS applications, and rapidly develop and deploy cloud applications.

Read the white paper to learn more.

The post The Zero Trust Approach for the Cloud appeared first on Palo Alto Networks Blog .