Zero trust security helps protect complex, distributed networks that cannot be protected using traditional perimeter security tools. Today’s networks enable connectivity with a diverse range of systems and environments, allowing numerous devices, users, and third parties to access the network remotely.
Zero trust security models go beyond traditional perimeter security models, helping organizations improve their security coverage. It involves enforcing security measures and mechanisms that never trust and always verify. Common zero trust security measures include microsegmentation, multi-factor authentication, and context-based access control policies.
Zero trust adoption has been growing steadily over the past few years, and has peaked in the wake of the COVID-19 pandemic. Security and risk leaders understand they need to mature their digital risk management practices. There is a growing focus on securing remote work, accelerating onboarding, and assessing security threats posed by third parties. All this needs to be done efficiently and cost effectively, given the reduction in budgets and the security skills storage.
Zero Trust provides a foundation for a practical, proven approach to secure digital transformation, while dealing with the challenges of a rapidly changing IT environment. Whether an organization operates on-premises, in the cloud, supporting in-house employees, work-from-home employees, contractors, or customers, zero trust can provide a robust basis for securing the enterprise.
The analyst John Kindervag introduced the zero trust framework in 2010 while working at Forrester. It proposes an architecture that strongly protects high-value and sensitive assets. The zero trust model assumes that all endpoints and connections represent potential threats. It protects against internal and external threats and sophisticated attacks that might be difficult to detect.
Zero trust requires applying the following capabilities to an organization’s network:
The primary principle of the zero trust security model is to block all access to resources and data by default. Assets become accessible only to users with specific privileges, often limited in terms of timeframe and scope. Organizations should restrict access to what is essential to complete prescribed tasks (the principle of least privilege).
Whenever a user or entity tries to connect to an application or data set, the zero trust network must verify and authorize the connection. This access control measure ensures that all communications meet the organization’s security requirements. The zero trust model also extends authentication and authorization to all devices and network flows, with access governed by dynamic, context-based security policies.
Successful zero trust implementation requires collecting contextual information from all security domains. The teams in an organization must coordinate and prioritize access policies and ensure all connections are secure. The zero trust architecture necessitates a comprehensive strategy for implementing and integrating security tools and focusing on specific business objectives.
When adopting the zero trust model, organizations should address the following:
While zero trust may be complicated to implement at first, it is the most effective strategy for dealing with a rapidly changing threat environment. Zero trust helps provide important threat context and insights that enable security teams to deal with sophisticated threats.
The best way to implement a zero trust architecture is to split the process into small, simple steps. This process should include these basic steps:
In a traditional network, it is important to define the attack surface of the overall network – covering all entry points that attackers could exploit. A security perimeter protects the attack surface using controls like intrusion detection systems and firewalls, but this approach is less effective for distributed networks with remote access. Identifying and defending every entry point is impractical.
In a zero trust network, security teams prioritize the specific assets, services, and data they want to protect. The focus is on the protected surface, not the attack surface. This approach enables specialized protection for each asset.
It is important to know how traffic and data flow between applications and services. Understanding the interactions between resources helps inform security and access policies to defend each protected surface.
A zero trust model uses multiple micro-perimeters to protect each asset, rather than the traditional security perimeter encompassing the whole network. This granular approach involves segmenting the network and implementing separate security controls for each protected surface. It allows security experts to leverage different tools to protect different assets for a best-of-breed strategy.
Micro-perimeters rely on policies that determine access permissions and authorization measures. The Kipling method can help inform access control decisions based on considerations such as:
Zero trust relies on continuously monitoring the segmented network to enforce the access control policies applied to each protected surface and micro-perimeter. Security overseers should frequently review logs to identify performance issues such as latency or inefficient operations. Monitoring helps inform optimization decisions to adjust policies and access controls.
In this article, we explained the basics of zero trust security and showed a 5-step process to implementing zero trust in your organization:
We hope this will be useful as you take your first steps towards a zero trust security model.