Page 120 - Cyber Defense eMagazine RSAC Special Edition 2025
P. 120

Beyond  Zero  Trust:  How  to  Eliminate  Backup

            Access and Elevate Your Cyber Security



            Zero Access Fills the Gaps That Zero Trust Leaves Behind

            By Robert Marett, Chief Technology Officer, Cobalt Iron



            Astute data custodians use zero-trust methods to enhance infrastructure security. This model shifts the
            security  perimeter  from  traditional  network  boundaries  to  individual  resources,  requiring  continuous
            authentication and authorization for every single access request. However, a fundamental issue remains:
            the fact that access is granted in the first place. Once authenticated, a user could still do harm, even if
            by accident.

            While  zero  trust  significantly  improves  security,  there  is  a  more  robust  way  to  secure  the  backup
            environment, and that is not to grant access to it at all. The zero-access concept addresses the limitations
            of zero trust.








                                                                                                            120
   115   116   117   118   119   120   121   122   123   124   125