The Why and How of Adopting Zero Trust Model in Organizations
The Why and How of Adopting Zero Trust Model in Organizations
The Why and How of Adopting Zero Trust Model in Organizations
Keywords: Perimeter Security Model, Zero Trust Model, Threats, DDoS, Ransomware, Malware,
Man-in-the-middle, Cross-side scripting, SQL Injection, Phishing, Micro segmentation, Never trust
always verify principle, Internet Threat Model, BeyondCorp.
ABSTRACT
As organizations move most of their workloads to public cloud and remote work becomes more
prevalent today, enterprise networks become more exposed to threats both from inside and outside
the organization. The traditional Perimeter Security Model assumes that threats are always from the
outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and
software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,
which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates
and evaluates the model based on the various implementations by the leading industry players like
Google and Microsoft.
Zero Trust Model and it’s mandates Once the control pane decides that the user or device
request is allowed, it dynamically configures the
Zero Trust Model is where there is no trusted
data plane to accept traffic from that client alone. It
perimeter. Everything is primarily untrusted. A
can also coordinate the details of an encrypted tunnel
device, user and an application would, by default,
between the requestor and the resource. In summary,
receive the least privileged access to the architecture
a trusted third party is granted the ability to
even after authentication and authorization. The
authenticate, authorize and coordinate access in real
mandates of zero trust are: a) never trust b) always
time.
verify c) enforce least privilege.
In zero trust, one must assume that the attacker can
The concept of zero trust was first introduced by
use any arbitrary IP address. Hence protecting
Forrester research and is implemented by enterprises
resources using IP addresses no longer works. Hosts,
that need to secure highly sensitive data from cyber
even if they share “trusted zones” must provide
threats. The purpose of zero trust architecture is to
proper identification. Since attackers can employ a
passive method and sniff traffic, host identification At Microsoft, they realized that with growing cloud-
is not enough, strong encryption is also needed. based services and mobile computing, the
technology landscape for enterprises would have
The three components of zero trust networks are a) higher need for the zero-trust access architecture.
user/application authentication b) device Figure 4 shows the different steps espoused by
authentication c) trust. Apart from the user or Microsoft to mature an organization’s approach to
application, device authentication is just as security
important. A trust score is computed and the
application, device and the score are bonded to form
an agent. Policy is then formed against the agent in
order to authorize the request. With the
authentication/authorization components and the
aide of control panel in coordinating encrypted
channels, we can be sure that every single flow on
the network is authenticated. Unlike the perimeter a) Follow least privilege access principles for
security model, where security ends as soon as the identities, whether they are people, services
traffic reaches the VPN concentrator, in this model, or IoT devices.
security is ingrained through out the network. b) Once identity has been granted, data flows
from a variety of endpoints – from IoT
Implementing zero trust brings about several devices to smartphones, BYOD to partner
benefits to the business. Foremost among it is that it managed devices and on-premise devices
reduces the threat surface. It also provides increased to cloud infrastructure. It is important to
visibility to all user activities. monitor and enforce device health and
compliance for secure access.
The Internet Threat Model is defined in RFC 3552,
c) Apply controls to applications and API that
which is also the model used by zero trust networks
provide interface by which data is
to plan their security stance. Zero trust networks
consumed.
expand on the Internet Threat Model by considering
d) It is important to classify, label and encrypt
compromises on the endpoints. The response to
data and to restrict access to it.
these threats is to harden the systems proactively
e) Whether one uses on-premise
against compromised peers, and to facilitate
infrastructure, cloud infrastructure,
detection of those compromises. Detection is done
container-based solution or microservices,
by scanning those devices and by the behavioural
the medium represents a critical threat
analysis of the activity from each device. Frequent
vector. It becomes important to use
upgrades to software on the devices, frequent and
telemetry to detect and flag risky
automated credential rotation and in some cases
behaviours.
frequent rotation of the devices themselves is
f) Segmentation of networks (micro
employed to mitigate compromises at the endpoint.
segmentation) and deployment of real-time
All zero trust networks use Public Key Infrastructure threat protection, end-end encryption,
(PKI) that defines the set of roles and responsibilities monitoring and analytics help secure
that are used to securely distribute and validate networks.
public keys in untrusted networks. Entities like g) With increased visibility, an integrated
devices, users and applications are authenticated capability is needed to manage the influx of
using digital certificates and this is done via data.
automation. Because the public PKI system relies on
Microsoft identifies four scenarios to achieve
publicly trusted authorities to validate digital
zero trust: a) employees can enrol their devices
certificates, that are costly, less flexible and not fully
to the device management to gain access to the
trustworthy. Hence, zero trust networks prefer
company resources b) device health-checks per
private PKI.
application or service can be enforced c) when
Zero Trust Implementations not using a managed device, employees or
business guests can use a secure method to
In this section we discuss two implementations of access corporate resources d) employees can
zero trust model - one from Microsoft and the other have user interface options (portals, desktop
from Google. apps) to discover and launch applications and
resources.
Microsoft’s structured approach to d) Access Control Engine - a centralized
implementing the various zero trust stages is policy enforcement service referenced by
shown in Figure 5. Figure 6 shows the reference each gateway.
architecture used by Microsoft using its own e) Device Inventory Service – a service that
services to implement zero trust. continuously collects, processes and
publishes changes about the state of known
devices.
f) Gateways – a medium by which resources
are accessed, such as SSH servers, Web
proxies etc.
References: