{"id":1123404,"date":"2024-03-27T01:09:02","date_gmt":"2024-03-27T05:09:02","guid":{"rendered":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/uncategorized\/five-ways-to-implement-zero-trust-based-on-nsas-latest-guidance-sc-media\/"},"modified":"2024-03-27T01:09:02","modified_gmt":"2024-03-27T05:09:02","slug":"five-ways-to-implement-zero-trust-based-on-nsas-latest-guidance-sc-media","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/five-ways-to-implement-zero-trust-based-on-nsas-latest-guidance-sc-media\/","title":{"rendered":"Five ways to implement zero-trust based on NSA&#8217;s latest guidance &#8211; SC Media"},"content":{"rendered":"<p><p>    Organizations across all industries experienced a surge of    ransomware attacks last year as cybercriminals extracted    $1.1    billion in payments from victims. To thwart these bad    actors and improve network security, the National Security    Agency (NSA) released a new cybersecurity information sheet:    Advancing    Zero-Trust Maturity Throughout the Network and Environment    Pillar.  <\/p>\n<p>    As the creator of zero-trust, Im pleased to see the NSAs    document emphasizes a paramount, yet frequently overlooked    element of zero-trust security: segmentation.  <\/p>\n<p>    I have long advocated that segmentation stands as the    fundamental essence of zero-trust. However, in recent years,    there has been a noticeable tilt toward the Identity pillar of    zero-trust, leaving network security controls vulnerable both    on-premises and in the cloud.  <\/p>\n<p>    As the attack surface expands and the digital landscape grows    increasingly interconnected, segmentation of on-premise    networks, cloud, multi-cloud, and hybrid environments becomes    imperative for organizations to fortify resilience and    establish enduring zero-trust architectures.  <\/p>\n<p>    The NSA also recognizes the importance of \"data flow mapping.\"    Flow mapping has been a focal point of my zero-trust advocacy    since its early days. Understanding system interconnections is    essential for successfully architecting zero-trust    environments.  <\/p>\n<p>    NSAs document also underscores the significance of network    security technologies in establishing a zero-trust environment.    Organizations, whether on-premise or in various cloud    environments have largely overlooked the importance of network    security controls. I think of network security as the    cornerstone of zero-trust, particularly in combating ransomware    attacks that jeopardize essential services and disrupt everyday    life.  <\/p>\n<p>    The NSA has reaffirmed this pivotal role of network security,    finally granting zero-trust segmentation (ZTS) the recognition    it deserves. This guidance should help organizations comprehend    the importance of the Network pillar within zero-trust and    encourage them to pursue network security technologies as they    progress toward implementing a zero-trust architecture.  <\/p>\n<p>    As global connectivity grows, the attack surface expands.    Thats why its imperative for organizations to delineate, map,    and fortify their most critical Protect Surfaces within their    zero-trust environments.  <\/p>\n<p>    I hope the NSAs recommendations convince more organizations to    implement zero-trust as they cope with the ever-changing    cybersecurity landscape. These zero-trust principles have    become mainstream across various industries and organizations    of different sizes. As cyber threats evolve, more companies    will recognize the need to implement a zero-trust approach to    protect their digital assets.  <\/p>\n<p>    Here are my recommendations for how to implement zero-trust    effectively:  <\/p>\n<p>    I commend the NSA for issuing its latest guidance because its    a significant endorsement of the effectiveness and significance    of ZTS, offering invaluable guidance for organizations seeking    to fortify their cyber resilience amid the ever-changing threat    landscape. Its impossible to prevent all cyberattacks, but    implementing a zero-trust model will significantly reduce the    potential damage and strengthen any organizations security    posture.  <\/p>\n<p>    John Kindervag, chief evangelist,    Illumio  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.scmagazine.com\/perspective\/five-ways-to-implement-zero-trust-based-on-nsas-latest-guidance\" title=\"Five ways to implement zero-trust based on NSA's latest guidance - SC Media\" rel=\"noopener\">Five ways to implement zero-trust based on NSA's latest guidance - SC Media<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Organizations across all industries experienced a surge of ransomware attacks last year as cybercriminals extracted $1.1 billion in payments from victims. To thwart these bad actors and improve network security, the National Security Agency (NSA) released a new cybersecurity information sheet: Advancing Zero-Trust Maturity Throughout the Network and Environment Pillar.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/five-ways-to-implement-zero-trust-based-on-nsas-latest-guidance-sc-media\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-1123404","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1123404"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=1123404"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/1123404\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=1123404"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=1123404"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=1123404"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}