|
What are the Fundamental Principles of the Zero Trust Model?
1. Re-examine all standard access controls.
|
In a Zero Trust model, there are no reliable sources. The model assumes that potential attackers are present inside and outside the network. As such, every system access request must be authenticated, authorized, and encrypted.
|
|
|
2. Take advantage of a variety of preventative techniques.
|
A Zero Trust model relies on a variety of preventative techniques to prevent intrusions and minimize damage.
|
|
|
|
Identity protection and Device Discovery are essential for a Zero Trust model. Keeping credentials and devices ready for auditing to know which devices exist and which credentials exist in each device is the first step of Zero Trust, establishing what is normal and expected in the extended network ecosystem. Knowing how these devices and credentials behave and connect enables organizations to apply effective identity challenges and progressive authentication to anomalies.
|
|
Multi-factor authentication (MFA) is one of the most common ways to confirm user identity and increase network security. MFA relies on two or more evidence, including security questions, e-mail/text confirmation, or logic-based exercises to assess user credibility. The number of authentication factors an organization uses is directly proportional to network security - meaning that incorporating more authentication points will help strengthen the overall security of the organization.
|
|
Zero Trust also prevents attacks through least privileged access, which means that the organization grants the lowest possible level of access to each user or device. In the event of an intrusion, it helps to limit lateral movement in the network and minimizes the attack surface.
|
|
Zero Trust preventative models can use e-mail, encryption, and Cloud Access Security Broker security solutions to protect credentials and ensure that challenges and Zero Trust are also extended to software service provider transactions.
|
|
Lastly, the Zero Trust model uses microsegmentation
- a security technique that involves dividing perimeters into small zones to keep access separate to each part of the network - to contain attacks. This can be done through devices and functions or, more effectively, by control and identity groups and users. If an intrusion occurs, the attacker cannot exploit outside such microsegment.
|
|
3. Promote real-time monitoring and control to quickly identify and stop malicious activities.
|
While the Zero Trust model is widely preventative by nature, the organization must also incorporate real-time monitoring resources to improve breakout time - the critical window between when an attacker compromises the first machine and when it can move laterally to other systems on the network. Real-time monitoring is essential to the organization's ability to detect, investigate, and correct intrusions.
|
|
|
4. Align with a broader security strategy.
|
A Zero Trust architecture is just one aspect of a comprehensive security strategy. Moreover, while technology plays an important role in protecting the organization, digital resources alone will not prevent intrusions. Enterprises should adopt a holistic security solution that incorporates a variety of endpoint monitoring, scan, and endpoint response resources to ensure the security of their networks.
|
|
|
Finally, as we learned from the recent Sunburst attacks, even seemingly innocent software updates for common systems can cause harm. Having a solid incident response plan, as well as business continuity and recovery plans, helps at both ends of any unexpected incidents or potential intrusions.
|
|