54 points by security_researcher 11 months ago flag hide 25 comments
username1 11 months ago next
We use a microsegmentation approach, where communication is allowed only between explicitly defined trust zones. This enforces the principle of least privilege and makes it harder for an attacker to move laterally within the network.
username11 11 months ago next
Great approach! Just hoping the implementation of microsegmentation in your organization is well-structured and easily manageable with dynamic networks
username2 11 months ago prev next
Our company heavily utilizes multi-factor authentication (MFA) and strong encryption. We also enforce strict least-privilege access policies.
username12 11 months ago next
Implementing strong encryption and MFA are indeed crucial steps. Have you thought about integrating passwordless authentication or FIDO2?
username3 11 months ago prev next
We use a Zero Trust Network Access (ZTNA) model which grants access to internal applications based on user identity and context, not network location.
username13 11 months ago next
It's great you have a ZTNA model. But have you looked at how mature are your API Security strategies as well? It's 2022 already!
username4 11 months ago prev next
We implement continuous monitoring and threat detection tools. This helps us quickly detect and respond to any indicators of compromise.
username14 11 months ago next
Continuous monitoring and threat detection is a great start! There are some emerging technologies like AI/ML that can enhance your defense capabilities as well.
username5 11 months ago prev next
Our company has adopted a least-privilege principle for access to production systems. Even users with high-level permissions are not granted unlimited access.
username15 11 months ago next
I completely agree with the least privileged access principle. It might be worth looking at Just-In-Time (JIT) access to minimize the risk of account compromise or insider threats
username6 11 months ago prev next
Engineering teams utilizes DevSecOps, integrating security teams in the development process and practicing infrastructure as code. Security checks are automatically ran on pull-requests and code commits.
username16 11 months ago next
Great to hear about your DevSecOps. Have you integrated Security Automation and Orchestration to the mix too? It's no longer a luxury, but a need to tackle the sophistication of today's threats.
username7 11 months ago prev next
Our company has an incident response (IR) plan and conducts regular drills. It's important to practice such procedures to minimize the impact of potential breaches.
username17 11 months ago next
Organizations should also start integrating Threat Intelligence feeds into their SOCs. Helps you stay ahead of the curve without relying solely on the traditional indicators.
username8 11 months ago prev next
Zero Trust isn't just a security concept, but also an organizational culture and mindset shift. Employees are trained to be vigilant, to identify risks and threats, and to report them promptly to the security team.
username18 11 months ago next
Zero Trust is indeed a culture shift. Having a robust Awareness and Training program will ensure your employees are your strongest security asset.
username9 11 months ago prev next
Our company has different functional teams that collaborate to address Zero Trust security, such as: Identity | Access Control & Governance | Data Protection and Privacy | Network Segmentation | Continuous monitoring
username19 11 months ago next
Having specialized functional teams is a great strategy. Have you integrated a dedicated Cloud Security Team, especially with the increasing trend towards cloud adoption.
username10 11 months ago prev next
We maintain a backup and disaster recovery plan to ensure the business continuity in case of a major cyberattack. Data might not be just compromised but lost forever. A well-planned backup strategy is crucial.
username20 11 months ago next
Absolutely! The backup and disaster recovery plan must not be left behind. Also, verification through DR failovers and regular testing of that plan is a good practice.
username21 11 months ago prev next
For Zero Trust Security to work effectively, you need to have continuous authentication mechanism. I might add it to the approach list of my company
username22 11 months ago prev next
We've been looking at solutions like BeyondCorp Enterprise and the new Apple Enterprise Connect. Any experiences to share regarding vendor solutions for Zero Trust?
username23 11 months ago prev next
I've been looking into implementing a Software Defined Perimeter (SDP) as part of our Zero Trust strategy. Thoughts?
username24 11 months ago prev next
What is your take on the use of emerging technologies like Blockchain and IoT in Zero Trust strategies?
username25 11 months ago prev next
Zero Trust is more than technology, it's also about process and people. How are you tackling this?