What is Zero Trust? Security model

What is Zero Trust? Security model

Zero Trust is a security model developed by a former Forrester analyst John Kinderwag in 2010 year. Since then, the “zero trust” model has become the most popular concept in the field of cybersecurity. The recent massive data breaches only confirm the need for companies to pay more attention to cybersecurity, and the Zero Trust model may be the right approach.

Zero Trust refers to the complete lack of trust in anyone - even users inside the perimeter. The model implies that each user or device must validate their data every time they request access to some resource inside or outside the network.

Read on if you want to learn more about the concept of Zero Trust security.

How Zero Trust works

What is Zero Trust? Security model

The concept of Zero Trust has evolved into a holistic approach to cybersecurity that includes multiple technologies and processes. The goal of the zero trust model is to protect a company from today's cybersecurity threats and data breaches while also achieving compliance with data protection and security regulations.

Let's analyze the main areas of the Zero Trust concept. Forrester recommends that organizations pay attention to each of these points in order to build the best “zero trust” strategy.

Zero Trust Data: Your data is what attackers are trying to steal. Therefore, it is quite logical that the first basis of the concept of “zero trust” is data protection first, not last. This means being able to analyze, protect, classify, track and maintain the security of your corporate data.

Zero Trust Networks: To steal information, attackers must be able to move within the network, so your task is to make this process as difficult as possible. Segment, isolate, and control your networks with state-of-the-art technologies such as next-generation firewalls specifically designed for this purpose.

Zero Trust Users: People are the weakest link in a security strategy. Restrict, monitor and strictly enforce how users access resources within the network and the Internet. Set up VPNs, CASBs (Secure Cloud Access Brokers), and other access options to protect your employees.

Load Zero Trust: The term workload is used by infrastructure service and control teams to refer to the entire application stack and backend software that your customers use to interact with the business. And unpatched client applications are a common attack vector that needs to be protected from. Treat the entire technology stack, from the hypervisor to the web frontend, as a threat vector and protect it with zero-trust tools.

Zero Trust Devices: Due to the rise of the Internet of Things (smartphones, smart TVs, smart coffee makers, etc.), the number of devices living within your networks has increased dramatically over the past few years. These devices are also a potential attack vector, so they should be segmented and monitored like any other computer on the network.

Visualization and analytics: To successfully implement zero trust, give your security and incident response teams the tools to visualize everything that's happening on your network, as well as analytics to make sense of what's going on. Advanced threat protection and analytics user behavior are key points in the successful fight against any potential threats on the network.

Automation and control: Automation Helps keep all your zero trust systems up and running and monitors Zero Trust policies. People are simply not able to keep track of the volume of events that is required for the “zero trust” principle.

The 3 Principles of the Zero Trust Model

What is Zero Trust? Security model

Demand secure and verified access to all resources

The first basic principle of the Zero Trust concept is authentication and verification all access rights to all resources. Each time a user accesses a file resource, application or cloud storage, it is necessary to re-authenticate and authorize this user to this resource.
You must consider every trying to access your network as a threat until proven otherwise, regardless of your hosting model and where the connection comes from.

Use the least privilege model and control access

Least Privilege Model is a security paradigm that limits the access rights of each user to the level that is necessary for him to perform his duties. By restricting access to each employee, you prevent an attacker from gaining access to a large number of melons by compromising one account.
Use role model of access control (Role Based Access Control)to achieve least privilege and give business owners the ability to manage permissions on their data under their own control. Conduct eligibility and group membership reviews on a regular basis.

Track everything

The principles of "zero trust" imply control and verification of everything. Logging every network call, file access, or email message for analysis for malicious activity is not something that one person or an entire team can accomplish. So use data security analytics over the collected logs to easily detect threats on your network such as brute force attack, malware, or covert data exfiltration.

Implementation of the “zero trust” model

What is Zero Trust? Security model

Let's designate a few key recommendations when implementing the “zero trust” model:

  1. Update every element of your information security strategy to be in line with Zero Trust principles: Check all parts of your current strategy against the zero trust principles described above and adjust as necessary.
  2. Analyze your technology stack and see if it needs to be upgraded or replaced to achieve Zero Trust: check with the manufacturers of the technologies used about their compliance with the principles of "zero trust". Reach out to new vendors for additional solutions that may be required to implement a Zero Trust strategy.
  3. Follow the principle of a methodical and deliberate approach when implementing Zero Trust: set measurable goals and achievable goals. Make sure new solution providers are also aligned with the chosen strategy.

Zero Trust Model: Trust Your Users

The "zero trust" model is a bit of a misnomer, but "believe nothing, verify everything" on the other hand doesn't sound so good. You really need to trust your users if (and that's a really big "if") they passed an adequate level of authorization and your monitoring tools did not reveal anything suspicious.

Zero trust principle with Varonis

By implementing the Zero Trust principle, Varonis allows for a customer-centric approach. data security:

  • men scans permissions and folder structure for achievement least privilege models, appointment of business data owners and process setup management of access rights by the owners themselves.
  • men analyzes content and identifies critical data to add an extra layer of security and monitoring to the most important information, and to comply with legal requirements.
  • men monitors and analyzes file access, activity in Active Directory, VPN, DNS, Proxy and mail for create a basic profile the behavior of every user on your network.
    Advanced Analytics compares current activity with a standard behavior model to identify suspicious activity and generates a security incident with recommendations for next steps for each of the detected threats.
  • Varonis offers framework for monitoring, classifying, managing permissions and identifying threats, which is required to implement the principle of "zero trust" in your network.

Why the Zero Trust model?

The Zero Trust strategy provides an essential layer of protection against data breaches and modern cyber threats. All it takes for attackers to break into your network is time and motivation. No firewalls or password policies will stop them. It is necessary to build internal barriers and monitor everything that happens in order to identify their actions when hacked.

Source: habr.com

Add a comment