GRC Viewpoint

‘Zero Trust’ is One Among the Hottest Cloud Security Trends in 2022

Cloud security surfaces as one of the areas with the utmost focus in 2022. More and more enterprises continue to migrate their massive amounts of data to the cloud. As a result, the public cloud services will grow to be worth about $420 million towards the end of 2022.

The massive level of adoption of the cloud has made it a lucrative target for cybercriminals. For example, a survey by the International Data Corporation covered about 200 CISOs. The survey found that towards mid-2021, almost 98% of enterprises had suffered at least a breach with respect to their cloud security.

On 5th January this year, a New York-based attorney general revealed details of a breach. The breach involved the theft of data worth more than 15 billion. More than 17 well-known companies were the victims of the attack. In addition, almost 1.1 million accounts were compromised. 

READ MORE: Go-to-Market: The Last Major Cyber Attack Surface

Considering the situation’s intensity, it is hardly surprising that industry experts are worried about cloud security. Enterprises are heavily attentive towards ensuring their cloud deployments are safe. Enough investments are flowing in. Among the attempts to ensure cloud security, specific trends are emerging and gaining more significance. Zero Trust is one such trend. 

Zero Trust in Cloud Security

Zero Trust is based on a concept that follows the saying, never trust and verify always. In other words, an enterprise should not trust anything inside or outside its perimeters. Or, just eliminate trust without in-depth verification. 

READ MORE: Automation in Physical Security Market. The Most Influential Trend?

Although it may seem a challenging and complicated concept, it is something that needs to be enforced in every enterprise. Every enterprise has to ensure firewalls and perimeter security to make sure that its intellectual property and user data remain safe.

Here are some critical features of Zero Trust for Cloud Security

  • Proactively ensure safety around every device
  • Confirm that only permitted and known traffic is happening
  • Doing so may require the implementation of layer seven policy
  • Ensure adherence to access control requirements
  • Examine and log the entire traffic


Related Articles

Latest Articles