Basil Security: Zero-Trust Operations

An Intellyx Brain Candy Brief

Most insider threats are the result of carelessness, as employees take shortcuts that violate corporate policies. However, sometimes these threats are malicious.

Many organizations implement software-based protections against these insider threats – but there’s one group of people in the organization that typical insider threat protections don’t work well against: the operations (ops) team itself.

The problem: ops is responsible for managing and maintaining all software, including the insider threat protection software. So if a member of the ops staff goes rogue, they may have an easy time evading such controls.

Basil Security addresses this problem with its zero-trust operations offering. The vendor provides a policy language that is able to describe a correct operation, thus separating benign activities from suspicious ones across the entire IT infrastructure and application environment.

Basil Security also provides for distributed security policy enforcement over arbitrary code execution and data access, as well as an immutable data store suitable for guaranteeing the accountability and attribution necessary for audit and forensic purposes.

Basil Security also supports an implicit separation of duties, so that even the individuals responsible for installing and configuring Basil’s software must nevertheless comply with policies.

Copyright © Intellyx LLC. Intellyx publishes the Cortex newsletter, advises companies on their digital transformation initiatives, and helps vendors communicate their agility stories. As of the time of writing, none of the organizations mentioned in this article are Intellyx customers. To be considered for a Brain Candy article, email us at pr@intellyx.com.

SHARE THIS: