Identity at the core of zero trust: Becoming cyber secure in education

Francois Jacobs, Business Unit Manager at Datacentrix.
Francois Jacobs, Business Unit Manager at Datacentrix.

In an age marked by an unprecedented surge in cyber threats and data breaches, the importance of cyber security has reached new heights. Organisations worldwide are grappling with a mounting tide of cyber crime, with estimates from Cybersecurity Ventures projecting that cyber crime would cost the world a staggering $8 trillion in 2023; a number expected to soar to $10.5 trillion by 2025.

It's a daunting reality that no one can afford to ignore, regardless of their geographic location. The fact that businesses in Africa are not immune to this cyber crime deluge was a point under discussion at a recent joint Higher Education Information Technology South Africa (HEITSA) event with Datacentrix, which positions itself as a leading hybrid ICT systems integrator and managed services provider.

The organisation looked at the controls, processes and technologies that African businesses can put in place to help mitigate this risk as we move into a new era, in particular exploring the zero trust model as a transformative approach.

The evolution of zero trust

“Zero trust has evolved into a comprehensive framework, with identity as its central pillar,” explained Francois Jacobs, Business Unit Manager at Datacentrix. “That is, knowing who someone is, where they are coming from and how they are attempting to access data. Within the context of higher education and other sectors, the management of identities can present unique challenges and opportunities.”

The concept of zero trust originated in 2004 when the notion of ‘access control’ was introduced. This initial approach focused on device health and the origins of network traffic to segregate and grant access. However, it was a very network-focused approach, he stated. “It wasn't until around 2010 that the model expanded to encompass identity and data, moving beyond the network as the sole vector of trust.”

By 2014, the first real vendor solutions emerged, encompassing the core pillars of zero trust: identity, network and device, and data. Major companies like Google and Microsoft played pivotal roles in shaping the zero trust landscape. In the late 2020s, assessment models and practical guidelines – such as ZTX, the zero trust security framework from Forrester – further fuelled zero trust adoption.

“These steps provided the guidance that businesses needed on how to practically implement zero trust, as well as empowering the vendors in building the tools for organisations to use,” Jacobs continued, adding that the last big push for zero trust adoption was during the COVID-19 period, driven by remote and hybrid working.

Zero trust as we know it today

According to Jacobs, many of these key zero trust principles have their foundations in identity. “However, in today’s context, considering the concept of assumed breach and trusting no one until they have verified themselves in some authoritative way, it must be extended to include other important areas.”

Thus, zero trust as we know it today revolves around five core pillars:

  • Identity: Knowing an individual's identity beyond a shadow of a doubt is the first pillar. This encompasses authentication and authorisation practices that apply token-based or multi-factor authentication methods.
  • Telemetry and analysis: It is crucial to understand where an individual is coming from, the type of device they're using, the data they are trying to access and the workload they are attempting to access. This provides the foundation for trust decisions.
  • Data access: Zero trust requires a comprehensive view of who is trying to access data and under what conditions. This ensures that data remains protected against unauthorised access.
  • Automation and orchestration: These technologies enable real-time or near real-time trust decisions and actions, ensuring the security posture remains robust, and adequate action can be taken when needed.
  • Governance: Maintaining detailed records of who had access to what resources, and for what reasons, is essential for zero trust.

Challenges and opportunities in higher education

Implementing zero trust in higher education can present unique challenges, but can also be fruitful in many ways, said Jacobs. “Firstly, the scale and diversity of identities within higher education can be complex when compared to enterprises in other sectors, where you would typically find full-time employees and contractors, as well as long-term vendors and so on. Higher education institutions have a diverse array of identities, including students, faculty, administrators and even visiting professors and examiners. Managing the life cycles and verifying the identities of individuals that don't exist in strong, authoritative sources of identity can be a significant challenge.”

Adoption resistance with regards to new technologies can be another hurdle, particularly in a setting where connectivity issues and remote learning can be commonplace.

“We also see, quite often, that legacy platforms are still in use within these environments, which may not support these newer methods of authentication and analysis and identity management systems, or the required telemetry to support the zero trust framework.”

On the flip side, the shift towards cloud-based learning platforms and hybrid education has provided a unique opportunity for the adoption of zero trust within higher education, as it allows for better validation and verification of users – like those visiting professors – who fall outside the network perimeter.

The landscape of cyber security is rapidly evolving and zero trust has emerged as a powerful model to protect against the rising tide of cyber threats. It places identity at its core, necessitating robust identity verification, strong authentication, access controls and governance practices. In higher education, where diverse identities and hybrid learning have become the norm, the adoption of zero trust presents both challenges and opportunities.

The fundamental shift in perspective is clear, added Jacobs, namely, that trust can no longer rely solely on network parameters or application-centric thinking. “The zero trust framework provides a comprehensive approach that empowers organisations, including those in higher education, to manage access through a lens of trust that extends to identity, context and data.”

For more information on Datacentrix’s managed security solutions, please visit: https://www.datacentrix.co.za/security-services.html.

Share

Datacentrix

Datacentrix provides leading ICT integration services and solutions to South African organisations, ensuring their success and sustainability into the digital age. The company’s approach is to partner with its customers, equipping them with valuable insight and helping to align their ICT undertakings with their business strategy.

Datacentrix offers a deeply specialised skills component and is endorsed by the world’s foremost technology partners. The company is recognised for its agility, in-depth industry knowledge, proven capability and strong overall performance.

Datacentrix is a Level One (AAA) B-BBEE Contributor, with 135 percent procurement recognition. For more information, please visit http://www.datacentrix.co.za/.

Editorial contacts

Nicola Read
icomm
datacentrix@pr.co.za