<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Eunjee Choi</title>
    <description>The latest articles on DEV Community by Eunjee Choi (@ec_pomerium).</description>
    <link>https://dev.to/ec_pomerium</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2831436%2F569501d8-ab3a-471b-b434-db6b86f8c26c.png</url>
      <title>DEV Community: Eunjee Choi</title>
      <link>https://dev.to/ec_pomerium</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ec_pomerium"/>
    <language>en</language>
    <item>
      <title>Context-Based Access Control and Zero Trust: Key Insights from the CSA White Paper</title>
      <dc:creator>Eunjee Choi</dc:creator>
      <pubDate>Thu, 13 Mar 2025 01:35:06 +0000</pubDate>
      <link>https://dev.to/pomerium/context-based-access-control-and-zero-trust-key-insights-from-the-csa-white-paper-4he2</link>
      <guid>https://dev.to/pomerium/context-based-access-control-and-zero-trust-key-insights-from-the-csa-white-paper-4he2</guid>
      <description>&lt;h2&gt;
  
  
  Introduction
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://cloudsecurityalliance.org/" rel="noopener noreferrer"&gt;Cloud Security Alliance (CSA)&lt;/a&gt;released a &lt;a href="https://cloudsecurityalliance.org/artifacts/context-based-access-control-for-zero-trust" rel="noopener noreferrer"&gt;white paper&lt;/a&gt; on Context-Based Access Control (CBAC) and its role in advancing Zero Trust security models. The paper underscores the necessity of shifting from static, trust-based access control to real-time, adaptive authentication that evaluates risk dynamically, and Pomerium was highlighted as a key player in the CBAC space. &lt;br&gt;
We’ll break down the white paper’s key findings and explore how Pomerium aligns with this modern security framework.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Traditional Access Controls Fall Short
&lt;/h2&gt;

&lt;p&gt;Historically, access control has been based on predefined roles and entitlements. The &lt;strong&gt;Role-Based Access Control (RBAC)&lt;/strong&gt; model assigns permissions to roles rather than individual users, simplifying management but failing to adapt to real-time threats. &lt;strong&gt;Attribute-Based Access Control (ABAC)&lt;/strong&gt; improves on RBAC by considering user attributes, but it still lacks dynamic risk assessment and real-time adaptability.&lt;br&gt;
The CSA paper highlights how modern identity-based attacks, such as credential theft and lateral movement, exploit these traditional models. Attackers can obtain valid credentials and operate within an organization undetected, as access decisions are based on static rules rather than continuous evaluation.&lt;/p&gt;

&lt;h2&gt;
  
  
  What is Context-Based Access Control (CBAC)?
&lt;/h2&gt;

&lt;p&gt;CBAC represents a paradigm shift in access control. Instead of granting access solely based on identity or static attributes, CBAC evaluates &lt;strong&gt;real-time contextual signals&lt;/strong&gt; to determine whether a request should be approved. These signals can include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;User behavior&lt;/strong&gt;: Is the user accessing resources in a typical pattern?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Device health&lt;/strong&gt;: Is the device compliant with security policies?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Location &amp;amp; network conditions&lt;/strong&gt;: Is the request coming from a familiar or risky location?&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Time &amp;amp; frequency&lt;/strong&gt;: Is access being requested at an unusual time or with an abnormal frequency?
By continuously analyzing these factors, CBAC minimizes implicit trust and ensures that every access request is assessed based on current risk factors rather than static policies.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Read more about CBAC vs. RBAC vs. ABAC, the CBAC Maturity Model, and Pomerium's role as a zero trust, context-aware access solution on our &lt;a href="https://www.pomerium.com/blog/context-based-access-control-and-zero-trust-key-insights-from-the-csa-white-paper" rel="noopener noreferrer"&gt;blog&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>zerotrust</category>
      <category>cybersecurity</category>
      <category>accesscontrol</category>
      <category>securityframework</category>
    </item>
    <item>
      <title>What You Need to Know From the 2024 ITRC Data Breach Report</title>
      <dc:creator>Eunjee Choi</dc:creator>
      <pubDate>Thu, 27 Feb 2025 00:34:43 +0000</pubDate>
      <link>https://dev.to/pomerium/what-you-need-to-know-from-the-2024-itrc-data-breach-report-5hb6</link>
      <guid>https://dev.to/pomerium/what-you-need-to-know-from-the-2024-itrc-data-breach-report-5hb6</guid>
      <description>&lt;p&gt;Every year, the Identity Theft Resource Center (ITRC) publishes its Data Breach Report, and every year, the numbers tell a familiar story: breaches are still rampant and personal data is still getting exposed. &lt;/p&gt;

&lt;p&gt;The statistics and trends revealed in the ITRC’s 2024’s Data Breach Report help us understand where we are, where things are headed, and—most importantly—what we can do about it.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;The Big Picture: 2024 Was a Year of Massive Exposure&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;If there’s one number you take away from the report, it’s &lt;strong&gt;3,158&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;3,158 data compromises were recorded in 2024, just 44 short of the all-time high set in 2023. While the total number of breaches did not increase, the number of victim notices skyrocketed by 312%—meaning the scale of each breach is growing.&lt;br&gt;
In fact, six “mega-breaches” accounted for 85% of all victim notices in 2024.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Biggest Data Breaches of 2024&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Ticketmaster – 560 million victim notices&lt;/li&gt;
&lt;li&gt;Advance Auto Parts – 380 million victim notices&lt;/li&gt;
&lt;li&gt;Change Healthcare – 190 million victim notices&lt;/li&gt;
&lt;li&gt;DemandScience – 121 million victim notices&lt;/li&gt;
&lt;li&gt;AT&amp;amp;T – 110 million victim notices&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Although these massive incidents were the stars of the show last year, the reality is that thousands of smaller breaches are happening constantly, many of which go unnoticed by the public.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;What’s Changing? Key Trends from the Report&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Companies Won’t Tell Us How They Got Hacked&lt;/strong&gt;&lt;br&gt;
70% of cyberattack-related breach notices in 2024 failed to disclose how the attack happened—a significant jump from 58% in 2023. This lack of transparency makes it more difficult for other companies to learn and strengthen defenses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Financial Services Overtakes Healthcare as the #1 Target&lt;/strong&gt;&lt;br&gt;
For the first time since 2018, the Financial Services sector suffered more breaches than Healthcare. Although this could indicate improvements in healthcare security, it’s more likely that there’s been a shift in attacker focus. Banks, insurance providers, and payment processors hold valuable data and may be more vulnerable than the healthcare sector that has endured innumerable attacks in the past years.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Credential-Based Attacks Are Still the Top Problem&lt;/strong&gt;&lt;br&gt;
Four of the six biggest breaches in 2024 were caused by stolen credentials—something that could have been prevented through Multi-Factor Authentication (MFA) and passkeys. According to the report, 94% of all devices now support passkeys, but adoption is slow, and companies continue to rely on passwords that attackers can guess or steal.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;4. AI is Helping Hackers—But Also Defenders&lt;/strong&gt;&lt;br&gt;
While no breaches were officially attributed to AI-powered attacks, it’s clear that AI is being used to enhance phishing attempts, automate attacks, and find vulnerabilities faster than ever. At the same time, AI-powered security tools are improving at detecting threats, creating an ongoing arms race between attackers and defenders.&lt;/p&gt;

&lt;p&gt;Read more on the historical context, what needs to change, and the importance of Zero Trust security models on &lt;a href="https://www.pomerium.com/blog/2024-itrc-data-breach-report" rel="noopener noreferrer"&gt;our blog&lt;/a&gt;.&lt;/p&gt;

</description>
      <category>databreach</category>
      <category>identitytheft</category>
      <category>zerotrust</category>
    </item>
  </channel>
</rss>
