The software solutions offered by NCP for secure data communication have been pursuing this approach for several years. In contrast to conventional VPN products, which only open a secure tunnel from the outside into the supposedly always-trustworthy corporate network, these solutions based on the Zero Trust principle offer significantly higher protection. For example, the NCP Secure Enterprise Management (SEM) allows administrators in the company to configure all necessary access rights of entire user groups or even only individual users granularly. This makes it possible to implement the proven principle of Least Privilege.
The key questions in the Zero Trust implementation are:
- Who is the user, device or application that wants to access a resource?
- Which resource should be accessed?
- Is access from a device known to the company and possibly even managed by it?
- At what point in time and from where does access take place?
- Are these activities already known – or is there something unusual about them?
The answers to these questions determine whether access is allowed or blocked.
What advantages does Zero Trust have
Companies benefit from a Zero Trust concept in various ways. By first finding out where data worth protecting is located everywhere and who needs access to it, transparency is increased throughout the network. We are all familiar with the consequences of the Covid pandemic, which drove countless employees worldwide into working from home and continues to create a high demand for secure long-distance connections. Zero Trust also goes far beyond traditional protection concepts through firewalls and classic security solutions by closely linking identities to users, devices and applications.
But back to the question of how compliance and Zero Trust are related. Since every single access in the network must be checked and approved when implementing the Zero Trust principle, it is easier to comply with regulatory requirements. The data collected is not only used for its actual purpose, access control, but often also to document compliance with compliance requirements. Checking the time, location and all applications involved in access requests enables a seamless and transparent audit trail.
How Zero Trust, compliance and GDPR intertwine
In addition, zero-trust implementations facilitate compliance with the General Data Protection Regulation (GDPR), which applies in Europe to all companies that process personal data of EU citizens. Zero-trust measures ensure that only authorized users have access to personal data. They also guarantee that the processed data is stored and transmitted securely. However, the General Data Protection Regulation can also complicate the introduction of a Zero Trust solution. This is especially true if personal data is collected in creating user profiles to evaluate access requests. In this case, a data protection impact assessment must be carried out in advance in accordance with Art. 35 GDPR.
Would you like to find out more about Zero Trust? Please contact us with any questions: NCP implemented Zero Trust even before the term became a buzzword. Trust is good, Zero Trust security is better!