Page 23 - Banking Finance July 2025
P. 23

ARTICLE

         In a post-pandemic world where remote access has become Least Privilege Access
         the new normal, traditional security methods based on  Zero Trust enforces the principle of least privilege, meaning
         physical boundaries no longer suffice. Zero Trust shifts the  users, applications, and systems are granted only the mini-
         focus to user identity and device health, enabling secure  mum level of access necessary to perform their specific func-
         access regardless of location. This makes it particularly suit-  tions. This limits potential damage in case of a breach or
         able for securing mobile banking, digital account opening,  insider misuse. For example, a customer service executive
         and cloud-based platforms.                           should not have access to the bank's internal IT systems, just
                                                              as a system administrator should not have access to cus-
         Moreover, Zero Trust helps financial institutions meet strin-  tomer financial records unless absolutely necessary.
         gent regulatory requirements such as those under GDPR,
         PCI-DSS, and RBI guidelines. By enforcing fine-grained ac-  Micro segmentation
         cess controls and maintaining detailed logs of user activity,  Micro segmentation involves dividing the IT infrastructure
         institutions can more easily demonstrate compliance and  into small, secure zones and applying access controls to each
         reduce the risk of penalties for data mishandling.
                                                              zone individually. This approach prevents attackers from
                                                              moving laterally across the network. If a breach occurs in
         Key Principles of the Zero Trust Security            one segment, it can be isolated and contained, reducing the
         Model                                                likelihood of a widespread compromise. In banking, this
                                                              means that a breach in the HR system wouldn't automati-
         The Zero Trust Security Model is a modern approach to  cally grant access to the loan processing or customer ac-
         cybersecurity that assumes no user or system should be in-  count systems.
         herently trusted-whether they're inside or outside the net-
         work. It emphasizes rigorous verification, minimal access,  Continuous Monitoring
         and constant oversight to prevent breaches and limit their
         impact. Below are the core principles that define this model:  Zero Trust relies on real-time monitoring and analytics to
                                                              detect unusual behaviours and threats as they emerge. By
                                                              constantly observing user activity, login patterns, access fre-
         Never Trust, Always Verify
                                                              quency, and device behaviour, security teams can identify
         This is the foundational concept of Zero Trust. Unlike tradi-  anomalies and take immediate action. Continuous monitor-
         tional models that automatically trust users or devices in-  ing ensures that even if a threat manages to penetrate the
         side the network perimeter, Zero Trust assumes that no
                                                              first layer of defence, it can be quickly detected and neu-
         entity-internal or external-should be trusted by default.  tralized before it causes significant damage.
         Every access request must be explicitly authenticated, au-
         thorized, and continuously validated, regardless of where it  Device Security
         originates. This principle ensures that trust is earned and  In a Zero Trust environment, access is not only dependent
         re-evaluated constantly, not granted once and assumed
                                                              on user identity but also on device health and compliance.
         forever.
                                                              Only devices that meet established security standards-such
                                                              as having up-to-date antivirus software, secure configura-
                                                              tions, and no known vulnerabilities-are granted access to
                                                              resources. This is especially critical in remote work scenarios,
                                                              where personal or unmanaged devices could otherwise be-
                                                              come points of compromise.

                                                              Strong Authentication (Multi-Factor Au-

                                                              thentication - MFA)
                                                              Authentication in a Zero Trust model goes beyond simple
                                                              usernames and passwords. It incorporates multiple layers
                                                              of verification to ensure that users are who they claim to
                                                              be. Multi-Factor Authentication (MFA) typically combines:

            BANKING FINANCE |                                                                  JULY | 2025 | 21
   18   19   20   21   22   23   24   25   26   27   28