{"id":38165,"date":"2022-09-14T06:56:22","date_gmt":"2022-09-14T10:56:22","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=38165"},"modified":"2022-10-14T08:40:21","modified_gmt":"2022-10-14T12:40:21","slug":"how-zero-trust-architecture-protects-physical-it-infrastructure-too","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/how-zero-trust-architecture-protects-physical-it-infrastructure-too\/","title":{"rendered":"How Zero-Trust Architecture Protects Physical IT Infrastructure, Too"},"content":{"rendered":"

The same Zero-Trust tools that protect your digital assets also protect the buildings that house them as well as the people who keep everything up and running.<\/h2>\n
\n

Location, location, location. It\u2019s been the mantra of real estate professionals for years, but it needs to be the mantra of those charged with protecting IT infrastructure, too.<\/p>\n

No matter how cloud-based your organization is, you still rely on physical buildings to house servers, barge lines, data centers, racks, network devices and the people who operate them. Tools like physical or digital keys, cameras, alarm and badge systems, and proxy cards control access to who can enter facilities. But in our age of drone strikes, suicide bombers and GIS services such as Google Maps, how do you protect your physical IT infrastructure?<\/p>\n

Companies often address the challenge by placing critical IT infrastructure in unmarked buildings or working with companies like Google to hide satellite images of their infrastructure.<\/strong> But these solutions don\u2019t get to the root of the problem \u2014 how online vulnerabilities can expose your buildings, just as they expose your digital assets.<\/p>\n

\u201cHow Vulnerable Is My IT Infrastructure?\u201d Let Us Count the Ways!<\/h2>\n

Applying a Zero-Trust approach to your physical IT infrastructure starts with the Zero-Trust pillars we\u2019ve already addressed in this blog series<\/a>. Allowing offsite access to company laptops without online identity<\/a> or endpoint protection \u2014 as well as failing to provide end-to-end encryption or to secure apps<\/a> \u2014 open the door to bad actors.<\/strong><\/p>\n

Here are some examples of how those bad actors can breach infrastructure on various levels.<\/p>\n

Individual Employees<\/h3>\n

Imagine that two employees at a large insurance company are exchanging emails about work they need to do at an unmarked, offsite data center. During the exchange, one of them drops the address of the facility.<\/p>\n

However, without MFA, bad actors only need a username and password to gain access to the company\u2019s email system. Requiring an additional device for login, such as the employee\u2019s cell phone, adds an additional layer that significantly reduces the risk.<\/p>\n

Regulatory Requirements<\/h3>\n

Failing to adhere to regulatory requirements can put you at risk, as well.<\/strong> While few companies do so intentionally, over time, the requirement to process Payment Card Industry (PCI) data or other sensitive information separately from other data processing systems can slip. In addition to violating regulatory requirements, the failure to segment such data puts you at risk of legal exposure from regulators or from customers with vulnerable data. This is especially relevant in highly regulated industries like healthcare, manufacturing and financial services.<\/p>\n

Significantly, segmentation regulations apply whether your services are on premises or hosted in the cloud. That means cloud providers must also comply.<\/strong> Microsoft, for example, has been independently audited by the Securities and Exchange Commission and deemed to comply with regulations for infrastructure in Azure and throughout the Microsoft 365 environment, including SharePoint, Teams, OneDrive, Yammer and Exchange).<\/p>\n

Below are some of the major regulations governing segmentation and infrastructure. Others may apply to your industry:<\/p>\n

Segmentation Regulations<\/h4>\n