Zero trust design principles
Trust has been an important factors of human life so as IT. A
few months back I heard an interesting buzz word from my boss (No, he is really
not a buzz word architect) a.k.a Zero
Trust security design. Here is some of my thought. My upcoming blog will contain
detailed implementation of those principles who believe on “Show me the code”
Or “Trust on Code”.
Zero trust is a security concept
that requires all users, even those inside the organization's enterprise
network, to be authenticated, authorized, and continuously validating security
configuration and posture, before being granted or keeping access to
applications and data. It is like never trust anyone here in the context of
user of a system, could be identities or devices or applications or data or
infrastructure, and network. Among the COVID-19 pandemic crisis various
governments and regulatory authorities mandate both public and private
organizations to embrace new practices for working remotely and maintaining
social distancing. With the widespread use of BYOD device, WFH trend, and
internet penetration across the corners of the globe, individuals are
progressively inclined towards the use of digital technologies such as cloud
solutions. This seems to be the driving factor of Zero Trust Design. the market
size seems to grow by USD 51.6 billion by 2026 and whispered across following
solution type.
- Network Security
- Data Security
- Endpoint Security
- Security Orchestration Automation and Response
- API Security
- Security Analytics
- Security Policy Management
Is Zero Trust a Tool? – No it is more of enterprise initiative, approach to make enterprise more secure though Identity and Access Management solution always plays a key role here. Infect Microsoft has gone one step ahead and build a high level Microsoft Zero Trust Maturity Model and actionable items. On a high level here are some of my understanding on approach and check list to proceed with Zero Trust Security design model.
- Verify identities before granting anyone to the right level of access to workplace systems and information: When any identity attempts to access any resource, security controls should verify the identity with strong authentication, ensure access is compliant and typical for that identity, and confirm that the identity follows least privilege access principles. Now in any standard enterprise, having bespoke identity control system is very difficult to manage, hence having a central Identity and Access Control system is becoming a key focus. In simple word, every request requires continuous authentication and the old school implementation of Imprecision or Trusting just the Front Layer/API layer is a clear NO-NO.
- Uplift authentication: Two or more verification factors to gain access to enterprise resource is now a common standard. If you do not have, consider it as part of Zero Trust Design.
- Implement password less authentication: Over a decade of time Passwords based authentication are known to be a weak point in computer systems (due to reuse, sharing, cracking, spraying etc.) and are regarded a top attack vector responsible for a huge percentage of security breaches. Password less Authentication as an authentication method that allows a user to provides some other form of evidence such as a fingerprint, proximity badge, or hardware token code. The fundamental implementation factors can be
- Ownership factors (“Something the user has”) such as a cellular phone, OTP token, Smart card or a hardware token.
- Inherence factors (“Something the user is”) like fingerprints, retinal scans, face or voice recognition and other biometric identifiers.
Key benefits reside on
- Greater security
- Better user experience – No need to remember complicated password and comply with different security policies.
- Reduced IT costs – No password storage and management so as Password management regulations
- Better visibility of credential use -Access management becomes more tight.
- Scalability – Managing multiple logins without additional password fatigue or complicated registration.
4.Segment your corporate network: Since all business-critical data is accessed over network infrastructure, Networking controls provide critical functionality to enhance visibility and help prevent attackers from moving laterally across the network. Segmenting networks and conducting deeper in-network micro-segmentation is important for Zero Trust.
5.Segment your applications: Like network segmentations, application segmentation such as (Cloud, on –Premise, Mobile, Shadow IT) and ensuring that apps, and the data they contain, are protected is a necessity for Zero Trust Design
6.Uniform Security Policy across Device: With the Zero Trust model, the same security policies are required to be applied whether the device is corporately owned or a personally owned phone or tablet, a.k.a “bring your own device” (BYOD). the plain old MDM solution are again brighter side.
7.Define roles and access controls: With clear network, application segmentations and password less authentication each Role the user is tied upon need to be managed and governed. And that is where rationalizing and managing the Roles at enterprise level and separate it from application level is one of the key need of Zero Trust Design Principles.
From an implementation aspect, every IAM products are in to the rat
race of marketing their IAM product in to this space though nothing wrong on this
but somehow I feel it is diluting the core principles of what an enterprise need
versus what is the core offering.
I borrowed this diagram from Microsoft 12 steps to
implementing Zero Trust identity management principles in Azure as an example
for the same (Any Offense to any one is not intended here)

Comments
Post a Comment