Zero trust sounds so harsh. But real cybersecurity results can come from the harsh-sounding scheme that defines every relationship as fraught with danger and mistrust. Zero-trust security is a common topic of discussion in cybersecurity circles these days, but understanding it goes beyond the name. The simple-sounding strategy comprises several key components.
No Soft, Chewy Center
The classic network model was described as a hard shell surrounding a soft center. The idea was that perimeter security would be so effective that nothing could get through to the network assets inside. The problem with the model is obvious.
No perimeter can be 100% effective 100% of the time. People began to ask, “How do we protect networks when the assumption must be that attackers will get inside the perimeter?” The answer? More perimeters.
And “zero trust” was the label, coined by John Kindervag, now field CTO at Palo Alto Networks, when he was vice president and principal analyst at Forrester Research.
A Perimeter in Every Pot
What if every network segment, every application, and every critical data resource was its own perimeter requiring authentication? Attackers who made it through the external network perimeter might be limited in the damage they could do,because they could not get into important network and data resources.
In order to make an attacker’s job as difficult as possible, authentication requirements can divide the network into many small regions — a process known as microsegmentation. Each of the segments can be defined and protected by a next-generation firewall to ensure that only authorized users, devices, services, and traffic can move between segments and protected resources.
Least Privilege for Smallest Resource
To keep the risk at each segment as small as possible, user and device privileges tend to be assigned according to the principles of least privilege, in which each authenticated agent has only the privileges required to access that segment; privileges don’t carry over between segments.
By limiting the privilege of each account and limiting the scope of each segment, zero-trust networks limit the damage that can be inflicted by any attacker. Zero-trust architectures have the additional benefit of being reconfigured more easily than more traditional networks because the scope of any single change is limited in reach. New segments can be added, or segments can be dropped, without requiring changes across the entire network.
Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio