Zero Trust and Identity

We’ve discussed Zero Trust before; for security, it is rapidly becoming the bedrock that all else is based on. The core concept behind Zero Trust is identity – how we can identify and verify users. This is, however, getting increasingly complex.

What do we mean by identity?

Identity is simply who you are, what your credentials are and how they can be validated. This identifies the user and allows logs to track activity across the system, at least up to a point.

Identity is central to questions of security. According to the Global Incident Response Report, nearly 90% of incident response investigations trace back to identity compromise. It makes detecting a breach incredibly difficult, since you depend on identifying out-of-pattern behavior by an otherwise validated account. And it gets worse.

Non-human identity

Service accounts, API tokens, machine credentials. All of these are non-human identities in your system. In many cases they are over-credentialed with too high access to internal systems, or a non-human equivalent of a zombie account (still in the system despite being theoretically defunct).

While Zero Trust principles have set a good standard to build on, they remain imperfect. For that matter, so does relying on backup for your disaster recovery needs. While a backup and restore will allow you to roll back malicious changes or defeat ransomware, it doesn’t help identify the point of compromise that allowed your systems to be infiltrated in the first place.

The need is for a system that will allow for tracking relationships and behavior over time – who has access to which systems, how that access changed over time, what systems depended on which identities. This allows for a more comprehensive review of backup files and critically also allows organizations to theoretically checkmark a backup as pre-intrusion.

Disaster recovery is key

Organizations looking to avoid the massive financial impact of even an unsuccessful cyberattack need to invest into their security systems well beforehand; Zero trust principles and identity validation, a good comprehensive backup, and employee training should all intertwine to create an interlocking system of security measures.

TECH-ARROW can help! Our contentACCESS Backup for Microsoft 365 is top in class among backup solutions, deployable on the Cloud, on premises or as a hybrid of the two. If you’re interested in learning more, contact our team for a free consultation – or download a trial version of our backup for free today.

Archive smarter – with TECH-ARROW.

Your Data In Your Hands – With TECH-ARROW

by Matúš Koronthály

Image generated by Canva