Zero Trust

Overview#

Zero Trust is a data-centric architecture and Access Control Models that puts micro-perimeters around specific data or resources so that more-granular Access Control Policy rules can be enforced and implemented. Zero Trust model, or ZT was first in 2010 by John Kindervag of Forrester Research in the document No More Chewy Centers: Introducing The Zero Trust Model Of Information SecurityZero Trust core principle is to not allow any access to network resources, internal IP Address, or servers until the entity properly authenticated and their Access Request to the specified resource is authorized.

Digitally Trust is a Binary True or False decision. Zero Trust implies there is no Trust.

Never Trust, Always Verify [1] [2]#

NIST.SP.800-207 Zero Trust Model clearly states that the goal of Zero Trust is to focus security on a small group of resources (zones) in lieu of wide network perimeters or environments with large quantities of resources interacting "freely". This is a strategy where there is no implicit trust granted to systems based on their physical or network location (Local Area Networks, Wide Area Networks, and the Cloud), but rather access is granted by a trusted source for either a UserId or application (i.e. Digital Identity).

BeyondCorp#

BeyondCorp is an implementation by Google for a Zero Trust Architecture.

The Zero Trust Architecture is simple: cybersecurity professionals must stop trusting packets as if they were people. Instead, they must eliminate the idea of a trusted network (usually the internal network) and an untrusted network (external networks). In Zero Trust, all network traffic is untrusted.! Forrester’s Zero Trust Model has three key concepts: [3]

In short, Zero Trust flips the mantra "trust but verify" into "verify and never trust." Zero Trust advocates two methods of gaining network traffic visibility: monitoring and logging. Many security professionals do log internal network traffic, but that approach is passive and does not provide the real-time protection capabilities necessary in this new threat environment.

Zero Trust promotes the idea that you must be monitoring traffic as well as logging it. In order to do so, Network Analysis and visibility (NAV) tools are required to provide scalable and non-disruptive situational awareness. NAV is not a single tool, but a collection of tools that have similar functionality. These NAV tools include network discovery tools for finding and tracking assets, flow data analysis tools to analyze traffic patterns and user behavior, packet capture and analysis tools that function like a network DVR, network metadata analysis tools to provide streamlined packet analysis, and network forensics tools to assist with incident response and criminal investigations.

Forrester says there are only two Data Classifications that exist in your organization:

The first type is sensitive or toxic data, which can be easily identified with the equation 3P + IP = TD. The three P's stand for

Forrester breaks the problem of securing and controlling data down into three areas:

Zero Trust is:

Zero Trust promotes Access Control around each resource

More Information#

There might be more information for this subject on one of the following: