NOVEMBER 202219The expanding risk of cyber-attacks led the Ministry of Electronics and Information Technology to issue guidelines regarding the adoption of zero-trust architecture earlier this year. Zero trust architecture has arisen as a response to today's perimeter-less networksthe business. Enterprises and fast growing mid-market companies are conducting more than six internal investigations per month and expect investigatory workloads to increase. But with zero trust architecture, this can be a daunting task.Identifying the Problem SetDigital forensic investigators detect and respond to incidents on all devices, and log, analyze, and share learnings from these incidents. For instance, in case of a data breach, a digital forensics team would examine the network and identify signs of malware, unauthorized user accounts, or accounts with unauthorized privileges. These investigators can determine if an attack is still ongoing, and identify whether the damage can be halted. For these teams to perform their tasks effectively, the technology they use must ideally have:· Admin access across the network· Deploy agents to remote devices· Inventory all devices and the ability to respond to incidents on these devices· Operate across platforms including Mac, Windows and Linux· Image and collect data forensically across an encrypted connection
<
Page 9 |
Page 11 >