Zero Trust and MFA Key to Secure Data Access, Say Experts

Industry experts at the Cyber Security India Expo emphasized Zero Trust architecture and multi-factor authentication as key to securing data access. Akshay Yadava from UIDAI highlighted the importance of establishing proof of presence beyond OTPs. Upendra Upadhyay from MyGov urged swift implementation of DPDP guidelines to protect sensitive data. They also recommended transitioning to authenticator-based applications and role-based access permissions.

Key Points: Zero Trust & MFA Vital for Data Security: Experts

  • Zero Trust architecture is essential for verifying credentials
  • Multi-factor authentication extends beyond OTPs for robust security
  • DPDP guidelines implementation crucial for data protection
  • Authenticator-based apps and role-based access recommended
3 min read

Multi-factor authentication and Zero Trust vital for secure data access: Experts

Experts highlight Zero Trust architecture and multi-factor authentication as best practices for secure data access, emphasizing proof of presence and DPDP guidelines.

"Zero Trust is something that is now close to our hearts - Akshay Yadava"

Mumbai, April 23

Industry experts identified the adoption of Zero Trust architecture and multi-factor authentication as the primary best practices for securing access to private files. They emphasized that establishing a definitive proof of presence and utilizing modern regulatory frameworks remained essential to safeguarding the digital ecosystem against evolving manipulation and unauthorized access.

Speaking to ANI on the sidelines of the Cyber Security India Expo, Akshay Yadava, Director at UIDAI, noted that Zero Trust became a central focus for the organization due to the critical nature of verifying credentials. He explained that the process of an entity proving its identity was a fundamental requirement for establishing a formal presence in any digital transaction.

"I think Zero Trust is something that is now close to our hearts. The reason it is close to our hearts is that the factor between an entity establishing who they are and proving those credentials is something that becomes very essential and is one of the most important part for the formal establishment of the presence of that entity," Yadava stated.

The authority provided a comprehensive trust architecture that allowed businesses to enhance their operations through multiple channels. Yadava highlighted that these frameworks enabled organizations to establish a proof of presence that extended beyond simple OTPs, offering more robust security through integrated processes.

"Now from UIDAI's point of view we are giving you a complete trust architecture and we are giving you multiple options for you to utilize this architecture to enhance your business. You can come on board as an Aadhaar authentication user agency or you can come on the offline verification seeking entity channel. Why I make these two statements or mentions is for the simple reason that we are giving you an opportunity to utilize our frameworks to establish a proof of presence and this proof of presence is not restricted to OTPs. That means you've got an option to use multi-factor authentication and build it into your processes to verify the end users whom you will be onboarding or providing a service to," Yadava said.

Addressing the role of Artificial Intelligence, Upendra Upadhyay, Director of Analytics at MyGov, stated that proper AI development served as the only effective countermeasure to the improper use of the technology.

He also urged the swift implementation of Digital Personal Data Protection (DPDP) guidelines to secure sensitive information and improve organizational efficiency.

"Implement DPDP guidelines as quickly as possible because when you fully implement these guidelines, you are able to protect, first of all, your most important data. Secondly, the speed and the execution of the systems also become much faster. And why it is most important to implement it now because the threat levels of the applications have increased beyond their permissible limit. Once you implement these DPDP laws, strictly in your organization, the efficiency of the organization increases and also the data gets secured," Upadhyay said.

Upadhyay further noted that traditional passwords lacked the capacity to secure data across various modern systems and devices. He advocated transition towards common authenticator-based applications and restricted, role-based access permissions to ensure that users only interacted with relevant data points.

"Increase the usage of authenticator-based applications, which use a common authentication. Secondly, the access-based permissions need to be increased and encouraged at all the levels so that the only access based permissions are allowed to the particular users and all the users does not have the access to all the data points," Upadhyay concluded.

- ANI

Share this article:

Reader Comments

P
Priya S
The DPDP guidelines implementation timeline is concerning. Data breaches in India have increased by 300% in the last two years, and yet many organizations still rely on basic passwords. We need stricter enforcement, not just recommendations.
R
Rohit P
As someone working in cybersecurity, this is spot on. The shift from 'trust but verify' to 'never trust, always verify' is crucial. But implementing Zero Trust in large government systems will be challenging - need more investment in infrastructure and training.
A
Arjun K
Good to see UIDAI evolving beyond just Aadhaar. The multi-factor authentication using integrated processes sounds promising. But honestly, common man needs simpler solutions - not everyone is tech-savvy. Hope they keep usability in mind.
N
Nikhil C
The point about authenticator apps is valid. I've been using Microsoft Authenticator and it's seamless. But many Indian companies still push SMS OTPs which can be intercepted. Time for a national-level common authenticator framework maybe? 🇮🇳

We welcome thoughtful discussions from our readers. Please keep comments respectful and on-topic.

Leave a Comment

Minimum 50 characters 0/50