It is a cybersecurity paradigm focused on enterprise resource protection. This includes data; no matter where it resides, cloud or on-premises, and resources like printers, compute resources and Internet of Things (IoT) actuators.
The objective of the paradigm is to prevent unauthorised access to data and resources but at the same time enable authorised and approved subject to have access to the same. The word subject can mean user, device or an application/ service. The paradigm also envisions making the access control enforcement as granular as possible.
Thus, “Zero trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust concepts and encompasses component relationships, workflow planning, and access policies. Therefore, a zero-trust enterprise is the network infrastructure (physical and virtual) and operational policies that are in place for an enterprise as a product of a zero trust architecture plan.”
Zero trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised.
The crux of the concept is that trust must be continually evaluated. If a subject needs access to data or resources, it is granted after authentication and authorisation, but it will not go beyond the minimum privileges needed to perform the mission.
The ZTA paradigm comes packed with a slew of benefits:
The Zero Trust Architecture evaluates the level of confidence about the subject’s identity for a unique request and if the device used to place the request have proper security posture. The system also evaluates if there are other factors that should be considered and that change the confidence level. Also the access rules are made as granular as possible to enforce those least privileges needed to perform the action in the request.
Image courtesy: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf
Three terms assume significance in the context of Zero Trust. They are Implicit Trust Zone, Policy Decision Point (PDP) and Policy Enforcement Point (PEP). Implicit Trust Zone represents an area where all the entities are trusted to at least the level of the last PDP/PEP gateway. In other words, the PDP/ PEP engine decides as to whether a request for resource should be allowed access to the Implicit Trust Zone from where it can access the resource.
The PDP/ PEP gate is more like an airport security checkpoint. The passengers, once they have been through the security check are granted access to boarding gates where they can wait for the entry to the airplane. They are considered worthy of trust once they are through. The boarding area is thus the Implicit Trust Zone in the analogy. In our case, the idea is to explicitly authenticate and authorize all subjects, assets and workflows that make up the enterprise.
For where there are opportunities, there are challenges. The road to ZTA implementation has its fair share of challenges.
The challenges need a holistic approach to overcoming them.
Taking care of governance: Agencies concerned must implement least-privilege policies by taking care of workflows, continuous integration and delivery pipelines and stave off misconfigurations. Just-in-time access policies are also a must-have rather than awarding engineers with all-access pass for specific, limited-time projects.
Tracking behaviour: Anomalies that may be borne out of compromised identities must be detected and mitigated.
Beinex has solid experience in fostering Zero Trust Architecture capabilities amongst clients. Considering the fact that 90+ entities of Beinex are government clients, our Digital Transformation Team is well positioned to implement the paradigm in multiple domains.
Contact us to know more about our offerings.