The Why and How of Adopting Zero Trust Model in Organizations

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

The Why and How of adopting Zero Trust Model in Organizations

Anita Nair, Solutions Architect at EY, India

Keywords: Perimeter Security Model, Zero Trust Model, Threats, DDoS, Ransomware, Malware,
Man-in-the-middle, Cross-side scripting, SQL Injection, Phishing, Micro segmentation, Never trust
always verify principle, Internet Threat Model, BeyondCorp.

ABSTRACT

As organizations move most of their workloads to public cloud and remote work becomes more
prevalent today, enterprise networks become more exposed to threats both from inside and outside
the organization. The traditional Perimeter Security Model assumes that threats are always from the
outside. It assumes that firewalls, proxies, IDS, IPS and other state-of-the-art infrastructure and
software solutions curb most of the cyberattacks. However, there are loopholes in this assumption,
which the Zero Trust Model addresses. This paper discusses the Zero Trust Model and it’s mandates
and evaluates the model based on the various implementations by the leading industry players like
Google and Microsoft.

Overview of Cybersecurity in Organizations


Most security leaders today are not very confident Types of Cybersecurity Threats and Attacks
about the existing security solutions working as
Some of the most common types of cyberattacks and
expected when most of the organizations’ workloads
are in the public cloud space. It is therefore critically threats that computer networks at organizations are
important that the cybersecurity model deployed, is prone to are:
effective and efficient in meeting the expectations of § Ransomware Software – This is a type of
the most modern working conditions. Threats due cyberattack where all files in the system get
to cyberattacks and hacking improvisations should encrypted and the hacker demands the
have lesser window of opportunities to obliterate the victim to pay if they want to regain the
assets held by organizations. In the following files. Organizations can protect their
sections of the paper, the currently popular perimeter network from Ransomware through
security model, which most enterprises have frequent assessment and good defence
deployed today, will be compared with the zero-trust systems.
model that the industry is moving towards. § Man-In-The-Middle attack – In this type of
Cyberattacks are various types of malicious attacks attack, the hacker tries to eavesdrop the
that target computer networks, information communication between targets and sniff
infrastructures and private computer devices, using information while it is being transmitted
various methods to alter, steal and destroy data. The over the internet. Encryption of data
attacks can be active or passive, depending on (example: SSL service) is the remedy used
whether it aims at altering or destroying the system to curb such a scenario.
resources or data, or gathering information from the § Denial of Service attack – Here the host
system but not altering or destroying the resource. intentionally sends too many requests to the
Cyberattacks bring loss to the organization and may target server, to crash it. This results in
result in loss of business, reputation or monetary disrupting or preventing legitimate users
loss. The business is ultimately compromised under from accessing websites, applications and
such circumstances. other resources. Usually load balancers
help in balancing the requests while the
server is flooded with more requests than it
can handle. The extended form of this
attack is the Distributed Denial of Service
attack (DDoS) in which many hosts send
requests to the server, each of which tries
to crash the system.
§ Cross-side scripting (XSS) attack – In this
attack, malicious scripts are used to exploit
a web application. The script checks the
sanitization of the web forms and writes
malicious code into the website, to get The disadvantages of this model are a) lack of intra-
useful information to the hacker, such as zone traffic inspection b) lack of flexibility in host
the user’s cookie details. It is also capable
placement c) single points of failure.
of changing the user’s settings and
displaying downloadable malware. As a If the network locality requirements are removed in
measure to prevent XSS attacks, web forms the above-mentioned network, the need for VPN is
should always check the submitted values. also removed. A virtual private network allows a
§ SQL Injection – In this type of attack, the user to authenticate to receive an IP address on the
hacker places malicious code in the SQL remote network. The traffic is then tunnelled from
statement via the input fields of the web the device to the remote network. All these
form or via the URL. The hacker can technologies of VPN, routers, switches, firewalls etc
likewise get the username and password open out advanced capabilities at the network’s
information. Few methods to prevent this edge. The core is never suspected and there is no
type attack are – input validation, enforcement of any measure in the perimeter model.
parameterized queries, stored procedures,
using escape characters in inputs, avoiding The way an external attacker could penetrate the
administrative privileges and using web perimeter security via trojan attacks can be
application firewalls. explained by the concept of phoning home, which is
§ Phishing – This type of attack falls under a term used to refer to the behaviour of security
the category of social engineering. Here, systems that report network location, username or
the hacker sends the authenticated user, the other such data to another computer. NAT is
webpage that looks the same as the configured to allow internal users to gain network
legitimate website and tricks the user to access. While there is a strict control on inbound
submit their credentials. A thorough traffic, outbound traffic through NATing could
understanding of various phishing consume eternal resources freely. Internal hosts
techniques is required to prevent this kind which in this way communicated freely with
of attack. untrusted internet resources could thereby be abused
while attempting the communication. Figure 2
Perimeter Security Model and loopholes shows how “phoning home” happens in a typical
attack where the attack is launched by an internal
The basic assumption of the perimeter security
host.
model is that cyber-attacks always arrive from
outside the network. This assumption led to securing
the perimeter of the network. Security devices and
software methods like firewalls, load balancers,
VPNs, DMZ etc formed the basis of perimeter
security. In this scenario, the company resources and
data existed mostly within the physical walls of the
organization. This worked well for protecting
against malware, phishing, denial of service and
zero-day attacks. Figure 1 represents a traditional
network security architecture.
address lateral threat movement within a network by
leveraging micro-segmentation and granular
perimeter enforcement, based on data, user and
location. This is also known as the “never trust
always verify” principle. The point of infiltration
mostly is not the attacker’s target location. The way
you define movement or access depends on the user
and their interactions and behaviour. For example, a
user from the marketing department often has no
access to sensitive financial files but would have
access to CRM systems and marketing content.
Hence, identifying who the users are, and verifying
if their actions during a session are appropriate, is
very important. It is important to make a note of
which applications the users are trying to access and
if it fits their roles and responsibilities.

Architecting Zero Trust Networks


The hacker may send emails to all employees of a
Figure 3 shows the zero-trust architecture at a high
company whose addresses can be found in the
level. The supporting system of the architecture is
internet by masquerading as a discount offer from a
the control pane. All other components come under
restaurant near the office. If an employee out of
the data plane, which the control pane coordinates
curiosity clicks the link, a malware is installed that
and configures. Requests for access to the protected
phones home and provides the attacker with a
resources are made through the control pane, where
session on the employee’s machine. In this fashion,
both the user and the device should be authenticated
the attacker first compromises a low-security zone
and authorized. Fine grained policies are to be
host and moves through the network towards high-
applied to this layer, based on the role in the
security zones where the host has access to. The
organization, time of the day or type of the device.
weak points in the perimeter security are usually
The more secure the resource, the tighter would be
places where firewall exceptions are made for
the authentication.
various reasons such as, a web developer needing
SSH access to production web servers or an HR
representative needing access to an HR software’s
database to perform audits.

Once a privileged workstation is located by the


attacker, a keylogger maybe installed and the
developer password could be stolen, which could be
used to elevate privileges on the production
application host. Database credentials could be
stolen from the application and the database contents
could be exfiltrated.

Zero Trust Model and it’s mandates Once the control pane decides that the user or device
request is allowed, it dynamically configures the
Zero Trust Model is where there is no trusted
data plane to accept traffic from that client alone. It
perimeter. Everything is primarily untrusted. A
can also coordinate the details of an encrypted tunnel
device, user and an application would, by default,
between the requestor and the resource. In summary,
receive the least privileged access to the architecture
a trusted third party is granted the ability to
even after authentication and authorization. The
authenticate, authorize and coordinate access in real
mandates of zero trust are: a) never trust b) always
time.
verify c) enforce least privilege.
In zero trust, one must assume that the attacker can
The concept of zero trust was first introduced by
use any arbitrary IP address. Hence protecting
Forrester research and is implemented by enterprises
resources using IP addresses no longer works. Hosts,
that need to secure highly sensitive data from cyber
even if they share “trusted zones” must provide
threats. The purpose of zero trust architecture is to
proper identification. Since attackers can employ a
passive method and sniff traffic, host identification At Microsoft, they realized that with growing cloud-
is not enough, strong encryption is also needed. based services and mobile computing, the
technology landscape for enterprises would have
The three components of zero trust networks are a) higher need for the zero-trust access architecture.
user/application authentication b) device Figure 4 shows the different steps espoused by
authentication c) trust. Apart from the user or Microsoft to mature an organization’s approach to
application, device authentication is just as security
important. A trust score is computed and the
application, device and the score are bonded to form
an agent. Policy is then formed against the agent in
order to authorize the request. With the
authentication/authorization components and the
aide of control panel in coordinating encrypted
channels, we can be sure that every single flow on
the network is authenticated. Unlike the perimeter a) Follow least privilege access principles for
security model, where security ends as soon as the identities, whether they are people, services
traffic reaches the VPN concentrator, in this model, or IoT devices.
security is ingrained through out the network. b) Once identity has been granted, data flows
from a variety of endpoints – from IoT
Implementing zero trust brings about several devices to smartphones, BYOD to partner
benefits to the business. Foremost among it is that it managed devices and on-premise devices
reduces the threat surface. It also provides increased to cloud infrastructure. It is important to
visibility to all user activities. monitor and enforce device health and
compliance for secure access.
The Internet Threat Model is defined in RFC 3552,
c) Apply controls to applications and API that
which is also the model used by zero trust networks
provide interface by which data is
to plan their security stance. Zero trust networks
consumed.
expand on the Internet Threat Model by considering
d) It is important to classify, label and encrypt
compromises on the endpoints. The response to
data and to restrict access to it.
these threats is to harden the systems proactively
e) Whether one uses on-premise
against compromised peers, and to facilitate
infrastructure, cloud infrastructure,
detection of those compromises. Detection is done
container-based solution or microservices,
by scanning those devices and by the behavioural
the medium represents a critical threat
analysis of the activity from each device. Frequent
vector. It becomes important to use
upgrades to software on the devices, frequent and
telemetry to detect and flag risky
automated credential rotation and in some cases
behaviours.
frequent rotation of the devices themselves is
f) Segmentation of networks (micro
employed to mitigate compromises at the endpoint.
segmentation) and deployment of real-time
All zero trust networks use Public Key Infrastructure threat protection, end-end encryption,
(PKI) that defines the set of roles and responsibilities monitoring and analytics help secure
that are used to securely distribute and validate networks.
public keys in untrusted networks. Entities like g) With increased visibility, an integrated
devices, users and applications are authenticated capability is needed to manage the influx of
using digital certificates and this is done via data.
automation. Because the public PKI system relies on
Microsoft identifies four scenarios to achieve
publicly trusted authorities to validate digital
zero trust: a) employees can enrol their devices
certificates, that are costly, less flexible and not fully
to the device management to gain access to the
trustworthy. Hence, zero trust networks prefer
company resources b) device health-checks per
private PKI.
application or service can be enforced c) when
Zero Trust Implementations not using a managed device, employees or
business guests can use a secure method to
In this section we discuss two implementations of access corporate resources d) employees can
zero trust model - one from Microsoft and the other have user interface options (portals, desktop
from Google. apps) to discover and launch applications and
resources.
Microsoft’s structured approach to d) Access Control Engine - a centralized
implementing the various zero trust stages is policy enforcement service referenced by
shown in Figure 5. Figure 6 shows the reference each gateway.
architecture used by Microsoft using its own e) Device Inventory Service – a service that
services to implement zero trust. continuously collects, processes and
publishes changes about the state of known
devices.
f) Gateways – a medium by which resources
are accessed, such as SSH servers, Web
proxies etc.

Evaluation of Zero Trust and Conclusion

Although zero-trust makes the designed network


highly secure, it can still be compromised by
attackers in some unique cases. The following are
some scenarios and pitfalls.

a) Identity Theft – All decisions in zero trust


networks are made based on authenticated
identities. If one’s identity is stolen, an
attacker can masquerade their way through
a zero-trust network. The identity which is
linked to a secret should be therefore
protected in different ways. Since zero trust
networks need both the device and
Google’s implementation of zero trust is called user/application to authenticate, it raises
BeyondCorp. It began as an internal google initiative the bar compared to ordinary networks.
to allow every employee to work remotely without b) DDoS attacks - While zero trust networks
VPN. BeyondCorp allows for single sign-on, access are concerned with authentication,
control policies, access proxy, and user and device- authorization and confidentiality, it does
based authentication and authorization. not provide good mitigation against DDoS
attacks.
The fundamental components of BeyondCorp
c) Endpoint Enumeration – It is easy for an
system include, Trust Inferer, Device Inventory
adversary to observe which systems talk to
Service, Access Control Engine, Access Policy,
which end points in a zero-trust network.
Gateways and Resources. The block architecture
Zero trust networks guarantee
diagram is shown in Figure 7.
confidentiality but not privacy. Tunnelling
the traffic through site-site tunnels makes it
more difficult to see which individual hosts
are communicating. However, it
undermines the concept of zero trust.
d) Untrusted Computing Platform – The
underlying computing platform of the zero-
trust architecture should be trustworthy. If
not, it is not possible to defend it.
The various components of the system are: e) Social Engineering – Whether it is phishing
attacks or social engineering via face-face
a) Resources - an enumeration of all communication, zero trust networks can do
applications, services and infrastructure only so much to defend against such
that are subject to access control. attacks. Behavioural analysis coupled with
b) Trust inferer - a system that continuously user training is the only way this can be
analyses and annotates the device states. mitigated.
c) Access policy - a programmatic f) Physical Coercion – The best we can do
representation of the resources. under such a circumstance is to keep least
sensitive information and systems
vulnerable to compromise of a single
individual. Physical attacks against About the Author:
individuals are best mitigated by a
consistent process of cycling both devices The author is a Software and Technology
and credentials. enthusiast who works at EY, India. Her areas of
g) Invalidation – It applies to long-running interests include Cloud Computing,
actions that were previously authorized but Cybersecurity, Software Design Patterns,
are no longer. An action could be an
DevOps, Computer Networking and
application-level request or a network
session. How quickly and effectively
Infrastructure, Emerging Technologies and
ongoing actions can be invalidated, deeply Research. She is a senior member of IEEE and a
affects the security response. The way to life member of CSI. She maintains a blog:
mitigate it, is to perform more granular https://mindovertechnologyblog.wordpress.c
authorizations on actions that are short- om/
lived. Another approach is to periodically
reset network sessions. The best approach
is to have enforcement components to track
ongoing actions and take ownership of the
reset.
h) Control Pane Security - It is possible to
completely thwart the zero-trust
architecture, if the control pane security is
compromised. For sensitive systems like
the policy engine, rigorous controls should
be applied from the beginning. Group
authentication and authorizations should be
considered, changes to control pane should
be made infrequently and should be
broadly visible. Another good practice is to
keep the control pane systems isolated from
an administrative point of view, which
means, they are kept in dedicated cloud
provider networks or datacentres with
rigorous access control.

While zero trust systems introduce new


consideration points for network security, it resolves
many other security issues. By applying automation
and tried-and-tested security primitives and
protocols, zero trust models will be able to replace
the perimeter model as a more effective, secure and
scalable solution.

References:

[1] Zero Trust Networks – By Evan Gilman and


Doug Barth

[2] Microsoft Documentation

[3] Google whitepapers on Beyondcorp

You might also like