Head of Technology & Consulting, PPE, Brillio
Global experience in leading digital strategy, building high-performance global teams and building cutting-edge solutions. Has collaborated with C-suite decision-makers to define and execute their digital business transformation charter, both in developed and emerging markets. In his, over 23 years of experience, he has led engagements which include Digital Business Transformation, IT Modernization, Cloud and Marketing Transformation. His technical background includes experience in designing, developing, enhancing, and integrating high volume external and internal facing marketing, experience, e-commerce systems, travel and hospitality systems, online banking, insurance systems, and education applications.
15th March, 2022
With the advent of the cloud, the traditional parameter security models, Zero Trust sometimes is also known as perimeter less security has become a key while designing and implementing digital products. In today’s world where there is an acceleration in digital services, cybercrime is one of the greatest threats which is for every enterprise and every individual in the world. To make sure that there is no financial loss, compromises to customer information and reputation loss for organizations, Zero Trust Architecture or ZTA has become an imperative.
What is Zero Trust?
As per NIST Special publication, ZTA is a collection of concepts and ideas designed to reduce the uncertainty in enforcing accurate, per-request access decisions in information systems and services in the face of a network viewed as compromised. Rooted in the definition and some key principles ZTA is designed to protect modern digital applications from any cyber-attacks.
Why is ZTA so important?
As per the report from Cybersecurity Ventures, the losses indicted by cybercrime will increase by 15% per year and will be reaching $10.5 Trillion annually by 2025. During pandemic the cybercrime went up by 150% and has caused billions of dollars of loss. Ransomware – malware that locks access to the computer system has been growing exponentially. WannaCry Ransomware in 2017 impacted 200,000 computers across 150 countries and demanded millions of dollars in bitcoin as ramson while impacting billions of losses as businesses productivity. Security experts believed that the worm originated from North Korea, but it was never established.
Key Principles for a ZTA
The Zero Trust Model (based on NIST 800-270) includes standards that help protect against the attacks that would plague the cloud-first deployment architectures.
The model talks about all the components which are rooted in a few key principles:
At Brillio we have been helping our clients in ensuring that the digital products that adhere to a blueprint we follow for ZTA. Our clients in various domains such as Banks, Financial institutions, Healthcare, Retail, and hence the confidentiality of their customer information is paramount. The digital products that we build have ZTA and its principles embedded as the solution, most of our solutions implement SSO, MFA, PAM, micro-segmentation, threat monitoring tools so on and so forth. Brillo has also co-developed a product Blue Planet Enterprise which enhances network visibility and control, it’s powered by AI models for closed-loop automation.
Zero Trust isn’t something that can simply be delivered by implementing a new piece of technology, nor is it a point product or service that you can just go out and buy. It is a security strategy that has some core principles and these need to be adhered to, all the time. In today’s world, the value of a business depends largely on how well it guards its data, the strength of its cybersecurity, and its level of cyber resilience. Hence the applications must be built around this strategy to build secure applications.