Learning Library

← Back to Library

Zero Trust: The New Security Paradigm

Key Points

  • Zero trust is a security strategy that rejects implicit trust based solely on factors like a device’s network location or a user’s badge, requiring continuous verification for every connection.
  • It isn’t a single product or technology you can buy; it’s a strategic approach built around three core principles.
  • Traditional perimeter defenses have become ineffective as remote work and hybrid‑cloud environments blur network boundaries, making “inside” versus “outside” meaningless.
  • The three zero‑trust principles are: (1) never trust, always verify every access attempt; (2) enforce least‑privilege access for users and applications; and (3) assume a breach will occur and design robust incident‑response plans.
  • IBM can help organizations adopt this zero‑trust model by providing services and expertise to implement continuous authentication, least‑privilege controls, and breach‑simulation readiness.

Full Transcript

# Zero Trust: The New Security Paradigm **Source:** [https://www.youtube.com/watch?v=yn6CPQ9RioA](https://www.youtube.com/watch?v=yn6CPQ9RioA) **Duration:** 00:03:42 ## Summary - Zero trust is a security strategy that rejects implicit trust based solely on factors like a device’s network location or a user’s badge, requiring continuous verification for every connection. - It isn’t a single product or technology you can buy; it’s a strategic approach built around three core principles. - Traditional perimeter defenses have become ineffective as remote work and hybrid‑cloud environments blur network boundaries, making “inside” versus “outside” meaningless. - The three zero‑trust principles are: (1) never trust, always verify every access attempt; (2) enforce least‑privilege access for users and applications; and (3) assume a breach will occur and design robust incident‑response plans. - IBM can help organizations adopt this zero‑trust model by providing services and expertise to implement continuous authentication, least‑privilege controls, and breach‑simulation readiness. ## Sections - [00:00:00](https://www.youtube.com/watch?v=yn6CPQ9RioA&t=0s) **Untitled Section** - ## Full Transcript
0:00xero trust is a security strategy that 0:03says you shouldn't grant implicit trust 0:05to a user device or an application based 0:08solely around some property about them 0:10like their network location 0:12over the next few minutes i'll explain 0:14exactly what we mean by this and how ibm 0:16can help 0:17but let's be really clear up front xero 0:20trust isn't something that can simply be 0:22delivered by implementing a new piece of 0:24technology nor is it a point product or 0:27service that you can just go out and buy 0:29it's a security strategy that has three 0:32core principles but before i come on to 0:34those let me explain why organizations 0:37are increasingly moving on from the 0:39previous popular model of perimeter 0:41security 0:42firstly there's this somewhat medieval 0:44notion that you have a perimeter to your 0:46network where you build the walls as 0:48high as possible and try and stop 0:50malicious actors at the gates 0:53this no longer works because employees 0:55are working from home more than they're 0:57working from the office and because 0:59hybrid cloud is now clearly the 1:01preeminent platform for enterprise 1:03infrastructure so it's an increasingly 1:05complex problem to even define a 1:07perimeter 1:09secondly the concept of trust is a very 1:11human one that we've taught computers to 1:13adapt to for example if i see helen 1:15every day in the office wearing her 1:17employee badge i trust that she's an 1:19employee and is there for the right 1:20reasons in reality i don't actually know 1:23that she wasn't let go last week for 1:25misconduct and is now back in the office 1:27trying to steal corporate data 1:30so a computer security model based on a 1:32human definition of trust is inherently 1:34flawed particularly in a world where 1:36attackers are finding it easier than 1:37ever to steal credentials and disguise 1:40themselves as trustworthy 1:42without a zero trust security model once 1:44an attacker is in the corporate network 1:46they can move laterally to new systems 1:48with relative ease 1:50this brings me on to the first defining 1:52principle of the xero trust model never 1:54trust always verify 1:57just because somebody's on your 1:58corporate network and is carrying that 2:00badge with an employee name on it 2:02doesn't mean that they are who they say 2:03they are or that they're necessarily 2:05well intentioned 2:06so this always verified piece refers to 2:08the fact that every time something like 2:10a user device or application tries to 2:12make a new connection attempt that 2:14attempt should be rigorously 2:16authenticated and authorized and not 2:18simply trusted because it's coming from 2:20inside the corporate network for example 2:23implement least privilege is the second 2:25core principle of a xero trust 2:26architecture which says you should only 2:28grant users and applications the minimum 2:31amount of access that they need to 2:33perform their job effectively and no 2:35more privileged access management is a 2:37great way of implementing least 2:38privilege for admin users for example 2:41and then finally assume breach 2:44this is my favorite of the zero trust 2:45principles because it encourages teams 2:47to plan for the worst case scenario and 2:50build robust and tested incident 2:52response plans so that when attacks do 2:54occur the time to respond is rapid and 2:56well practiced 2:57not only this but this principle 2:59encourages organizations to shrink the 3:01target and the impact zone of an attack 3:04through networking principles like micro 3:06segmentation 3:08so how can ibm security help 3:10we recognize that different clients will 3:12have different business drivers and 3:14priorities for why they want to deploy 3:15zero trust so we've created four 3:18actionable blueprints depending on where 3:20you want to start 3:21they are 3:22reduce the risk of insider threat 3:25secure the remote workforce 3:28preserve customer privacy and protect 3:31the hybrid cloud 3:33you can download these with no form 3:35filling required from 3:37ibm.com 3:38thanks for watching