
This article discusses on microsegmentation join hands with Zero Trust Architecture
Employees and organizations across the country are working on whatever device and network most accessible to them as the lines between work and home have almost all but faded in the past year. When larger workforce taken in to this model them the security risk and Vulnerability score will be huge .
Security Shifting to a Zero Trust Model
Working from anywhere is now the norm, not the exception. Perimeter is in prime focus earlier, but the shift of remote working combined with multiple cloud environments and personal devices means this approach isn’t enough.
Protecting today’s work environment which can now be anywhere in the world requires more than purchasing new tech or infrastructure. Managing permissions and access to workloads across a data environment instead requires a major shift in strategy, technology and processes.
Microsegmentation
A good defense in depth with the need to allow access to data and systems. By using network microsegmentation, small sections of access with walls between each segment can be created
By any chance if breach happens then only the data in the specific section breach is leaked and if a bad actor enters the network, they can only access and damage the one section. Microsegmentation limits the damage that can be done from a single attack, which decreases risk, even more so when it comes to remote work. Because of the increased use of Internet of things devices with sensitive health data, many health organizations are adopting this strategy to secure devices and data.

Policies Definition
The concept of role-based access for employees that used for decades easily transfers to microsegmentation. The data access that employees need in order to do their jobs and understand each workload. The process of internal microsegmentation with a complete analysis of data flows and infrastructure, you can begin to see where workload segments already exist for internal employees.
Data flow refers to the relationship between application access on onprem, cloud by end user systems. Zero trust defined the policies on which user connects to what application devices. Granular device based policies might help in complex networks
The concept of microsegmentation combined with zero trust provides strong protection against these type of threats. Instead of employees having access to all systems or even some systems, access is truly limited on an as-needed-for-work basis.
The authentication process for each access makes it harder for employees to reach sensitive data not related to their job. Business will be agile with employees, devices, application,workloads when this collaboration happens

