{"id":73154,"date":"2022-11-14T08:52:12","date_gmt":"2022-11-14T00:52:12","guid":{"rendered":"https:\/\/x-phy.com\/?p=73154"},"modified":"2025-10-02T06:50:18","modified_gmt":"2025-10-02T06:50:18","slug":"x-phys-zero-trust-model-that-eliminates-human-intervention","status":"publish","type":"post","link":"https:\/\/x-phy.com\/x-phys-zero-trust-model-that-eliminates-human-intervention\/","title":{"rendered":"X-PHY\u2019s Zero Trust model that eliminates human intervention"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"73154\" class=\"elementor elementor-73154\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26717e96 e-flex e-con-boxed e-con e-parent\" data-id=\"26717e96\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16465fc4 elementor-widget elementor-widget-text-editor\" data-id=\"16465fc4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>What is the Zero-Day Attack?<\/h6><p>Zero Trust model: Before we dive into the topic of <a href=\"https:\/\/x-phy.com\/solutions\/zero-trust\/\">Zero-Day Attack<\/a>, let\u2019s take a look at the three common cyber security terms used when discuss about Zero-Day and it would help to better understand the difference,<\/p><ul><li aria-level=\"1\"><b>Zero-Day Vulnerability<br \/><\/b>It is a software vulnerability that is discovered by the attacker before the security engineer knows about it.<\/li><li aria-level=\"1\"><b>Zero-Day Exploit<br \/><\/b>Unknown vulnerabilities exploited by the hackers previously.<\/li><li aria-level=\"1\"><b>Zero-Day Attack<\/b><br \/>The <a href=\"https:\/\/x-phy.com\/glossary\/attack-vectors\/\">Zero Day Attack<\/a> happens when vulnerabilities found in the system weren&#8217;t discovered by the software developer or security engineers but the attackers know about it and take advantage to exploit the software with no solutions.\u00a0<\/li><\/ul><p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/Blog-Post-3Nov2021-2-infographic.jpg\" alt=\"\" width=\"977\" height=\"894\" \/><\/p><p>The Zero-Day attack is a loophole for any hackers to enter into a system and it needs to be fixed as soon as the security engineers are aware of the incident. It may take months or even years to know about the <a href=\"https:\/\/x-phy.com\/glossary\/dma-understanding-the-risks-and-defenses\/\">Zero-Day exploits<\/a> which occured because of Zero-Day vulnerability. There are some prevention measures which help to prevent this attack, including scanning the traffic flow, code reviews and using malware detection tools. However, the Zero day attacks can easily bypass <a href=\"https:\/\/x-phy.com\/solutions\/ransomware-protection\/\">anti-virus software<\/a> which can only detect the known threats.<\/p><h3>How Zero Trust Model in X-PHY SSD Fight Against the Zero Day Attack and Other Cyber Threats?<b><br \/><\/b><\/h3><p>The Zero Trust model was created in 2010. It is about eliminating the trust and not about making the system trust the user. This is a concept centred on the belief that the corporates must verify anything and everything that is connected to the system within or outside it\u2019s perimeter.\u00a0<b><\/b><\/p><p>As cyber attacks become more sophisticated, it forms pressure among CISOs, CSOs, CIOs and other executives to implement a <a href=\"https:\/\/x-phy.com\/solutions\/zero-trust\/\">zero trust model<\/a> to protect their corporate data. In traditional security, the SSD trusts the traditional default user. Even if an unknown person initiates the <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">cloning attack<\/a> or any <a href=\"https:\/\/x-phy.com\/glossary\/ransomware-attacks\/\">ransomware attack<\/a> in the system. The SSD does not react and lock itself. With the X-PHY SSD, the <a href=\"https:\/\/x-phy.com\/glossary\/ransomware-attacks\/\">ransomware attacks<\/a> are recognised using behaviour based detection. The pattern of the ransomware is detected using the <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">AI technology embedded in the SSD.<\/a> It will lock it up immediately once it detects the ransomware attack pattern. It follows the principle, \u201cNever trust, always verify\u201d.<\/p><p><strong>You May Want to Read:<\/strong><\/p><h6><a href=\"https:\/\/x-phy.com\/zero-trust-model-against-insider-threats-with-x-phy-ssd\/\">Zero Trust Model against insider threats with X-PHY<sup>\u00ae<\/sup>\u00a0SSD<\/a><\/h6><h3>\u00a0<\/h3><h3>Here are a few core principles of zero trust model that is implemented in X-PHY\u2019s SSD,<b><br \/><\/b><\/h3><p><b>1: Strict evaluation of access controls<br \/><\/b>The X-PHY\u2019s tool is used to monitor the SSD\u2019s performance and enable\/disable security features like <a href=\"https:\/\/x-phy.com\/solutions\/ransomware-protection\/\">ransomware prevention<\/a>, <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">cloning prevention<\/a> and such. To access the tool, the user needs to password verify before accessing the tool which controls the X-PHY\u2019s function. To prevent any incidents, the multi-factor authentication is used to make any important changes in the tool. Once logged in, the 2FA authentication needs to be completed. For\u00a0<a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\" target=\"_blank\" rel=\"noopener\">X-PHY SSD<\/a>, the time-based random key from Google\/Microsoft Authenticator is used as the two-factor authentication.<\/p><p><img decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/unnamed-1-1.png\" alt=\"\" width=\"1221\" height=\"824\" \/><\/p><p><img decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/unnamed-2.png\" alt=\"\" width=\"1205\" height=\"819\" \/><\/p><p>For making any changes to the security features, need to verify the password and the OTP sent to the authenticator.<\/p><p><b>2: Variety of prevention techniques<\/b><br \/>Using AI and machine learning techniques, the patterns of previous <a href=\"https:\/\/x-phy.com\/glossary\/backdoor-attacks\/\">malware<\/a> are being examined and used to improve the detection of unknown threats\/ransomware. Once the ransomware is initiated in the system, the X-PHY detects by recognising the read, write and over pattern.\u00a0<\/p><p>After the detection, the SSD locks itself from the further read\/write access. No one can read the data inside the SSD while it\u2019s locked. The <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-laptop\/\">X-PHY mobile app<\/a> needs to be connected to the SSD by the legitimate user, via the BLE gateway to unlock the SSD.<\/p><p><b>3: Real-time monitoring to identify malicious activity.<br \/><\/b>In order to implement the zero trust model in any devices, real time monitoring plays a key role. It minimises the damage caused by the attacker and helps to identify the digital footprints of the malicious actions initiated towards the system. The X-PHY windows tool and the mobile have activity logs that record the <a href=\"https:\/\/x-phy.com\/glossary\/side-channel-attacks-the-silent-threat-to-data-security\/\">attack types<\/a>, SSD lock\/unlock timing and many more.\u00a0<\/p><p>Even during the <a href=\"https:\/\/x-phy.com\/products\/endpoint-security\/secure-ssd\/\">thermal attack or physical attack<\/a>, the activity log is monitored and stored. Once it is connected back again to a system, the log can be viewed. For the <a href=\"https:\/\/x-phy.com\/x-phy-vs-netwalker-ransomware\/\">rapid purge,<\/a> all the data inside the SSD is deleted excluding the activity log. This log is helpful for forensic analysis during a cyber attack.<br \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/x-phy.com\/wp-content\/uploads\/2021\/11\/unnamed-3.png\" alt=\"\" width=\"1209\" height=\"814\" \/><\/p><p><b>4: Alignment with broader security Strategy<br \/><\/b>The endpoint security is as important as the border security, it helps to monitor, detect and respond to the incidents better to ensure everything is safe.\u00a0<\/p><p>With the X-PHY&#8217;s SSD installed in the users PC and in one enterprise security management controller&#8217;s\/Security Engineer\u2019s PC at the Security Operation Centre in the company, you can prevent the ransomware attacks and it helps to secure all the endpoints from the Zero day attacks.<\/p><p>See Also:<\/p><h6><a href=\"https:\/\/x-phy.com\/why-zero-trust-architecture-is-necessary-in-critical-infrastructure-industries\/\">Why Zero Trust Architecture is necessary in Critical Infrastructure Industries<\/a><\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is the Zero-Day Attack? Zero Trust model: Before we dive into the topic of Zero-Day Attack, let\u2019s take a look at the three common cyber security terms used when [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":73158,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-73154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-products-and-solutions"],"_links":{"self":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/comments?post=73154"}],"version-history":[{"count":8,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73154\/revisions"}],"predecessor-version":[{"id":110284,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/posts\/73154\/revisions\/110284"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media\/73158"}],"wp:attachment":[{"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/media?parent=73154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/categories?post=73154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/x-phy.com\/wp-json\/wp\/v2\/tags?post=73154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}