Page 120 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 120
Beyond Zero Trust: How to Eliminate Backup
Access and Elevate Your Cyber Security
Zero Access Fills the Gaps That Zero Trust Leaves Behind
By Robert Marett, Chief Technology Officer, Cobalt Iron
Astute data custodians use zero-trust methods to enhance infrastructure security. This model shifts the
security perimeter from traditional network boundaries to individual resources, requiring continuous
authentication and authorization for every single access request. However, a fundamental issue remains:
the fact that access is granted in the first place. Once authenticated, a user could still do harm, even if
by accident.
While zero trust significantly improves security, there is a more robust way to secure the backup
environment, and that is not to grant access to it at all. The zero-access concept addresses the limitations
of zero trust.
120