Gartner defines zero-trust network access as a product or service that creates an identity- and context-based, logical access boundary around an application or set of applications. TechTarget puts it more simply, stating that the zero-trust cybersecurity model assumes that no users that are allowed onto your network should be trusted by default because they could be compromised.
A zero-trust approach requires identity and device authentication throughout your network—not just at the perimeter. Think of zero trust as locked doors at every access point, demanding the right key and authorization for anyone to gain entry.
That’s incredibly important, considering that 85 percent of all breaches involve the human element. All it takes is one person in your organization clicking on a malicious link or downloading an infected PDF to immediately put your network and your data at risk from malware and ransomware. With social engineering schemes becoming ever more sophisticated, a recent TechTarget article says some attacks are so well crafted that they even fool security researchers.
As part of its efforts to fortify the United States against cyberattacks, the National Security Agency (NSA) recommends that organizations embrace a zero-trust security model. The NSA defines the model as “a coordinated cybersecurity and system management strategy based on an acknowledgment that threats exist both inside and outside traditional network boundaries.”
When you move to a zero-trust model, you continuously limit access by anyone to only what is needed. And zero trust includes monitoring for unusual or malicious activities, granular risk-based access controls (RBAC), and automated, coordinated system security throughout your infrastructure. You should also put an added focus on protecting critical data in real-time.
Going back to the human element, a successful zero-trust security model requires that everyone within your organization, from the top down, understands and commits to zero-trust principles.
The NSA has published high-level guidelines that should serve as the basis for your decisions as you move to a zero-trust model, including:
The NSA also shares some core concepts that should form the basis of your zero-trust strategy, including:
With hackers targeting backups with much greater frequency so they can prevent your organization from recovering from an attack, protecting your backups is more critical than ever. We designed Arcserve UDP to support zero-trust security strategies and minimize exposure of essential data backups to external threats.
Arcserve UDP prevents unwanted access by including extended default configuration and customizable configuration. The solution’s features also ensure that only authorized users can access your data backups and your data protection infrastructure. Arcserve UDP can enable access to local users or can be integrated with your organization’s Active Directory deployment to simplify user management.
UDP also leverages zero-trust principles throughout the platform to protect your backups, including:
Arcserve UDP is, for the most part, self-sufficient, designed to operate in isolated environments. This approach adds further support to your zero-trust strategy by monitoring and minimizing access to your backup data so you can recover in the event of a disaster, including:
Arcserve also recommends limiting direct connections between networks to required ports when backups are replicated to remote sites or the cloud—TCP/8014 to replicate data and TCP/8015 for centralized management. This minimizes exposure of secondary backup copies of your data if your primary site is attacked by hackers or locked up by ransomware.
With advanced monitoring functionality, Arcserve UDP lets your backup admins react quickly to investigate any aspect of backup infrastructure operations—including security—by offering:
Comprehensive job logs that include all necessary information required to investigate backup and infrastructure anomalies. Arcserve UDP also alerts backup admins when an issue arises without logging in to the management console.
Arcserve is a strong supporter of the zero-trust model. To find out how you can put a zero-trust strategy in place, choose one of our expert technology partners or contact us for more product details.