Internal security Strategie für die „Goldenen Zwanziger ... · Tumblr Lhked/n Facebook /ns.wwn ....

Post on 09-Aug-2020

0 views 0 download

transcript

ZERO TRUST FUTURE CHALLENGES

THOMAS TSCHERSICHCHIEF SECURITY OFFICER DEUTSCHE TELEKOM

JUST ANOTHER…

THIS IS HOW OUR WORLD LOOKED LIKE FOR DECADES…

EVERYTHING WAS PROTECTED BY (FIRE-)WALLS

THIS IS OUR TODAY’S WORLD

Cloud services

No trust relation

Global supply chain

Everything is IP

Data outside corporate network

THE CASTLE WALLS HAVE ALREADY FALLEN…

WHAT IT’S ABOUT: PAST VS. TODAY

Everything is in the cloud

Workloads

Devices

Data

PeopleDevices

Data

Networks

Datacenter

People

ALL ABOUT MULTI-FACTOR AUTHENTICATION

Multi-Factor Authentication

Everything is in the cloud

Workloads

Devices

Data

People

WHAT ARE THE ADVANTAGES AND DISADVANTAGES?

Independent frominternal network

Single APPauthentication

Moved accessmanagement

More specific access controls

Greateffort

Must be implemented

on “green Field”

Identify weakcomponents

Explicit verification of users &

devices needed

BUT ZERO TRUST IS NOT ENOUGH

Improve reactionarycapabilities

PreventionMonitoring

WHAT DOES THIS MEAN FOR FUTURE REGULATIONS?

DON’T FOCUS JUST

ON INFRASTRUCTURE

BUT

1. FOCUS ON AUTHENTICATION

2. FOCUS ON VERIFICATION

THANK YOU.QUESTIONS?

THOMAS TSCHERSICH@TTSCHERSICH