Zero-Trust Frameworks Explained
Privacy Plus+
Privacy, Technology and Perspective
Zero-Trust Frameworks Explained. This week, let’s briefly explore Zero Trust (“ZT”) as a modern security strategy.
ZT is a principles-based framework designed to prevent data breaches by placing “zero trust” in all enterprise resources (not just networks), and assuming instead that the entire environment is hostile. ZT requires operational capabilities that:
- Never trust, always verify – Treat every user, device, application/workload, and data flow as untrusted. Authenticate and explicitly authorize each to the least privilege required using dynamic security policies.
- Assume breach – Consciously operate and defend resources with the assumption that an adversary already has presence within the environment. Deny by default and heavily scrutinize all users, devices, data flows, and requests for access. Log, inspect, and continuously monitor all configuration changes, resource accesses, and network traffic for suspicious activity.
- Verify explicitly – Access to all resources should be conducted in a consistent and secure manner using multiple attributes (dynamic and static) to derive confidence levels for contextual access decisions to resources.
Unlike traditional IT security models, which focus on network architecture and assume that at least what is inside a company’s own network can be trusted by default, a Zero-Trust model adopts a comprehensive “never trust, always verify” strategy. “Zero Trust” requires everything – including user identities, devices, applications, data, infrastructure, and networks, inside or out – to be validated and proven trustworthy.
ZT proponents argue that ZT places the focus squarely on data protection, and controls access to enterprise resources more precisely. Not only does it force companies to know exactly what users, devices, applications, data, infrastructure, networks, and services they have, but it also forces them to apply a "least privileged" access model and to secure each enterprise resource precisely by enforcing multi-factor authentication, granular segmentation policies and other controls, like containerization, in order to limit attackers’ ability to gain access to sensitive data no matter where it is located. Among other things, this helps mitigate the risks posed by third-party service providers, and also means that controls and policies are adaptive, tailored to the particular risk-context, and enforced at each application level, not at a network level.
The concept of Zero Trust was developed in 2010, but has been gaining traction as companies’ digital and data assets have grown, and especially as reliance on remote workforces, cloud computing, and hosted applications has quickly expanded companies’ security perimeters. A link to the original Zero Trust paper, Build Security Into Your Network’s DNA: The Zero Trust Network Architecture, follows:
http://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf
The National Institute of Standards and Technology (NIST) also is in the process of drafting a timely publication on ZT. A link to that draft follows:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207-draft2.pdf
Update: March 8, 2022: The latest federal ZT guidelines and documents follow:
- National Institute of Standards and Technology Zero Trust Architecture, August 2020 - https://csrc.nist.gov/publications/detail/sp/800-207/final
- Department of Defense Zero Trust Reference Architecture, February 2021 - https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v1.1(U)_Mar21.pdf
- National Security Agency (NSA) Zero Trust Reference Architecture, May 2021
- Executive Office of the President, Executive Order 14028, “ Improving the Nation’s
Cybersecurity,” May 2021 - https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
- Cybersecurity and Infrastructure Security Agency’s (CISA) Zero Trust Maturity Model, Draft, June
2021 - https://www.cisa.gov/sites/default/files/publications/CISA%20Zero%20Trust%20Maturity%20Model_Draft.pdf
- OMB’s Draft Zero Trust Strategy: Moving the U.S. Government Towards Zero Trust Cybersecurity
Principles, September 2021 - https://zerotrust.cyber.gov/downloads/Office%20of%20Management%20and%20Budget%20-%20Federal%20Zero%20Trust%20Strategy%20-%20DRAFT%20For%20Public%20Comment%20-%202021-09-07.pdf
---
Hosch & Morris, PLLC is a Dallas-based boutique law firm dedicated to data protection, privacy, the Internet and technology. Open the Future℠.