My Website

Main website: show.admoss.info

Wednesday, May 29, 2024

Zero Trust

 Transitioning from Password-Based Security to a Zero Trust Framework

(this article was generated by Edge Chat Assistant)

In the evolving landscape of cybersecurity, the shift from traditional password-based security to a Zero Trust framework is becoming increasingly imperative. Zero Trust is a security model that operates on the principle that no user or device should be trusted by default, even if they are within the network perimeter. This approach requires continuous verification of all access requests, regardless of their origin.


The move towards a Zero Trust model involves several key steps:


1. **Establish Strong Identity Verification**: Implement multi-factor authentication (MFA) to ensure that users are who they claim to be. This could involve a combination of something the user knows (like a password or PIN), something the user has (like a smartphone or token), and something the user is (like a fingerprint or facial recognition).


2. **Leverage Single Sign-On (SSO)**: SSO can simplify the user experience by reducing the number of login prompts while maintaining security. It allows users to access multiple applications with one set of credentials, which are verified for each session.


3. **Implement Least Privilege Access**: Ensure that users have access only to the resources they need to perform their job functions. This minimizes the risk of unauthorized access to sensitive data.


4. **Continuous Monitoring and Validation**: Regularly monitor and validate the security posture of devices and users. This includes checking for updates, patches, and compliance with security policies.


5. **Educate and Train Employees**: A cultural shift is necessary for the successful adoption of Zero Trust. Training employees on the importance of cybersecurity and the role they play in maintaining it is crucial.


6. **Passwordless Authentication**: The ultimate goal of Zero Trust is to eliminate the use of passwords altogether, as they are often the weakest link in security. Technologies like biometric authentication, push notifications, and digital certificates can replace traditional passwords.


The transition to a passwordless environment is not just a technical change but also a cultural one. It requires overcoming resistance to change and adapting to new authentication methods. By strategically deploying Zero Trust components such as SSO, MFA, and device trust, organizations can create a more secure and seamless user experience.


For businesses, moving away from passwords to a Zero Trust architecture not only enhances security but also streamlines the authentication process, reducing the burden on IT departments and end-users alike. As we embrace the future of cybersecurity, the advantages of a passwordless approach in a Zero Trust world become increasingly clear.

Wednesday, December 20, 2023

Rust - the programming language

My latest adventure in computer languages is Rust.

Rust is billed as the "most loved" computer language. Those who use Rust are certainly passionate about it. Jealous too. I found most of the tutorials on the major Rust frameworks have bugs that require fixing for the examples to run. Fixing them requires a level of familiarity you can only gain with experience. Without the tutorials, and lacking the experience to fix them, newbies are effectively locked out.

Monday, September 11, 2023

Subtle systemic bias

Postal vote applications for the 2023 referendum opened yesterday, 11 September. The earliest a postal vote applied for today (12 Sep) can be delivered is 01 October. For those who are booked on overseas trips (like me) that leaves only 1 or 2 days to apply to a postal vote if it is to arrive before I leave. (edit: it was not possible to have a postal vote delivered on time despite applying within minutes of availability. I was disenfranchised)

Tuesday, August 22, 2023

Flutter

Flutter is Google's promise of write once, run anywhere. And it actually delivers!

Unfortunately, there is a downside. I had to learn yet another programming language. Dart.

Wednesday, August 2, 2023

Powershell JEA

Just Enough Admin (JEA)

High privilege access to machines via PowerShell is a security risk. JEA allows access to only the commands and components of Powershell needed to perform a task and no more.