Summary of Zero Trust
Summary of Zero Trust
Summary of Zero Trust
SIM Session 2
Assignment 1
CSIT302 – Cybersecurity
Summary
With the continuous expansion of cyberspace and the advancement of AI technology, our society is facing
an increasingly sophisticated cyber threat. As cybercriminals become more skilled, traditional security
models are proving to be inadequate in safeguarding our sensitive data and protecting against cyber
breaches. Therefore, there is an urgent need for a more secure and effective security system to act as a
defense against these new and emerging cyber threats.
To address this need, we will explore the "Zero Trust Framework" for cybersecurity, its core principles,
benefits, and thoughts on it from a cybersecurity practitioner standpoint. This case study will delve into
the intricacy of the "Zero Trust" strategic approach to cybersecurity. First, let us briefly define what "Zero
Trust" is. It is a cybersecurity paradigm that challenges the conventional notion of trust within an
organization's network by eliminating implicit trust and continuously validating every stage of digital
interaction.
As the name suggests, a zero-trust architecture operates under the assumption that there is zero trust in
any digital interaction within or outside of the network. This means that threats can originate from both
internal and external sources. Therefore, it advocates for continuous authentication, verification, and
validation of every host, user, server, device, and network interaction, regardless of their origin or
location. It can be said to be a term for an evolving set of cybersecurity paradigms that move defenses
from static, network-based perimeters to focus on users, assets, and resources in order to enhance our
overall information security posture.
To understand how zero trust works in detail, we would need to first know how the conventional
cybersecurity approach works. Traditionally, cybersecurity relied on the premise of establishing a secure
perimeter to safeguard sensitive data and assets from external cyber threats. This is akin to building a gate
around your house with security personnel in place, to keep external threats and invaders from entering.
Though this approach has proved effective in the past, as the level and sophistication of cyber threats
evolve along with cyberspace, it is deemed to be less secure in the modern world. The main vulnerability
of this approach comes from the fact that social engineering attacks have increased multifold over the past
few years along with the increase in remote work, cloud computing, and mobile devices, the concept of
trying to establish well-defined secure perimeter has become even more obsolete.
Imagine a scenario whereby an intruder was able to pretend as a trustworthy insider, pass through
security, and enter your house. Since there is no further verification of identity within the gates of your
home, the adversity is free to do whatever he/she wishes to. That could very well be the reality of what
happens if we were to continue following the traditional approach.
When it comes to the "zero trust" approach, there is no such thing as an automatic trust even for entities
believed to be inherently safe within a secure network, it operatres on the premise that trust is never
granted implicitly but must be continually evaluated.The ultimate goal of zero trust can be said to enhance
the overall security posture by eliminating any assumption of "trustable entities" within a network by
implementing strict access controls, least privilege access, continuous monitoring, and micro-
segmentation to reduce the attack surface and prevent lateral movement by potential attackers.
Fundamental
approach Workings of “Zero Trust”
Identity Verification:
Zero trust begins with strong identity verification. Users, devices, and applications are assigned unique
identities, typically through the use of digital certificates, biometrics, or multi-factor authentication
(MFA). This ensures that only authorized entities can access resources.
Continuous Authentication:
Unlike traditional security models that authenticate users only at the initial login, zero trust continuously
verifies the user's identity and monitors their behavior throughout the session. This includes analyzing
factors such as device health, network location, user behavior analytics (UBA), and contextual
information to assess the risk level associated with each access request.
Least Privilege Access:
Zero trust follows the principle of least privilege access, which means that users are granted only the
minimum level of access required to perform their job functions. Access permissions are based on factors
such as role, responsibilities, and business need, and are regularly reviewed and updated as necessary.
Micro-segmentation:
Zero trust networks are divided into smaller, isolated segments known as micro-segments. Each segment
contains a specific set of resources and has its own access controls and security policies. This limits the
lateral movement of attackers within the network and reduces the impact of potential breaches.
Encryption:
Data is encrypted both in transit and at rest to protect it from unauthorized access. Encryption keys are
managed securely, and access to encrypted data is tightly controlled based on the principle of least
privilege.
Continuous Monitoring:
Zero trust networks employ continuous monitoring and real-time threat detection mechanisms to identify
suspicious activities, anomalies, and potential security threats. This includes monitoring network traffic,
user behavior, device health, and application interactions to detect and respond to security incidents
promptly.
Dynamic Policy Enforcement:
Zero trust policies are dynamic and adaptive, allowing organizations to enforce security controls based on
real-time risk assessments and contextual information. Policies can be automatically adjusted based on
changes in user behavior, device posture, or threat intelligence feeds.
Benefits of “Zero Trust” approach
Improves Network Visibility, Breach Detection, And Vulnerability Management
In a Zero Trust network, all network traffic is continuously inspected for malicious activity, enhancing
visibility and security. Security controls, such as next-generation firewalls, are placed close to the data to
enforce segmentation and inspect data flow thoroughly. Software-based solutions like microsegmentation
further enhance security by creating secure zones down to the workload level without requiring additional
hardware.
Zero Trust aims to prevent or limit the damage of data breaches by providing increased visibility into
network activity, enabling quicker breach detection and response. It also helps alleviate vulnerability
management issues by segmenting the network and allowing for more tactical patching and vulnerability
management protocols. Embracing Zero Trust can significantly improve network security, reduce the risk
of breaches, and better protect valuable assets against cyber threats.
Enhances Defense Against Malware Propagation
Zero Trust networks effectively halt the spread of malware, offering crucial protection against cyber
threats. Unlike traditional networks where malware can freely traverse routing and switch architecture,
Zero Trust environments limit its movement. By creating microperimeters around specific data, assets,
and applications, security professionals make it challenging for malware to propagate. Each
microperimeter enforces segmentation and inspects traffic using microsegmentation software or
hardware-based controls like NGFWs. This stringent inspection prevents malware from spreading easily.
For instance, if an employee clicks on a phishing link, the malware faces obstacles moving within a Zero
Trust network due to thorough layer 7 inspection and granular rule enforcement. Even if malware infects
a device within the network, Zero Trust's segmented structure impedes its progression. This was
exemplified by Banner Health's breach, where a compromised point of sale system led to the exposure of
3.7 million records. In a Zero Trust network, devices and networks are segmented into microperimeters,
preventing malware from traversing to other segments, thereby fortifying overall network security.
Reduces The Scope And Cost Of Compliance Initiatives
Segmenting your network under the Zero Trust model offers significant advantages in terms of
compliance and audit management. By dividing the network into microsegments, Zero Trust inherently
reduces the scope of compliance initiatives, aligning with regulations such as PCI DSS. For instance, PCI
DSS requires adequate network segmentation to limit the assessment scope, ensuring only relevant
segments are subject to compliance scrutiny. Zero Trust networks, designed with segmentation from
layers 2 through 7, naturally fulfill this requirement, utilizing physical or virtual security controls for
enforcement.
Moreover, Zero Trust simplifies compliance audits by aligning with audit requirements and minimizing
complexities associated with hierarchical network structures. Auditors find Zero Trust networks easier to
conceptualize, leading to smoother audits with fewer findings. This was exemplified by a CISO's
experience where internal auditors encountered no issues due to proper segmentation, resulting in a
smaller and less complex audit scope. Many aspects auditors seek are inherent to Zero Trust, easing the
audit process and ensuring compliance with industry regulations effectively.
Eliminates "Finger pointing" within an organisation while bolstering collaboration
In technology organizations, conflicts could arise between different teams like networking, security, and
operations, especially during incidents like network downtime, system failure, etc where finger-pointing
becomes common. Zero Trust requires breaking down these barriers, fostering closer relationships among
teams and encouraging collaboration. A Zero Trust network inevitably leads to more cooperation and less
finger-pointing, since the visibility and transparency of the solution provides significant insight into any
issues that might arise.
For instance, WestJet's Zero Trust deployment led to the creation of a center of excellence (CoE) that
facilitated collaboration between various teams to solve technical challenges. By promoting shared goals
and knowledge sharing, Zero Trust helps organizations break down interdepartmental silos, leading to
increased agility and a more mature technology management structure. This approach shifts the focus
from individual domains to secure networking as a collective effort, reducing conflicts and enhancing
cooperation across teams.
References