Zero Trust¶
Zero Trust is a cybersecurity approach that assumes no user, device, or system is trusted by default. Every access request is continuously verified, regardless of origin or location (internal or external). It addresses modern threats, especially in environments with deperimeterized networks (cloud, remote work, mobile devices).
Traditional Cybersecurity vs. Zero Trust¶
- Traditional cybersecurity relied on strong perimeter defenses, similar to a castle with walls and moats.
- Zero Trust challenges this model, acknowledging that modern networks (cloud, remote work) are less secure with perimeter-only defenses.
Drivers for Deperimeterization¶
- Cloud adoption and remote work increase the need for deperimeterized networks.
- Mobile technologies and wireless networks further enable access from various locations.
- Outsourcing and contracting also reduce the reliance on physical boundaries for security.
Key Concept: Trust Nothing, Verify Everything¶
- Unlike traditional models that trust users and devices once granted access, Zero Trust requires verification for every device, user, and transaction continuously.
- The approach is especially relevant in a world where threats can emerge from both internal and external sources.
Zero Trust Architecture: Control Plane vs. Data Plane¶
-
Control Plane
- Defines, manages, and enforces security policies for user/system access.
- Key components:
- Adaptive Identity: Real-time validation based on behavior, device, and location.
- Threat Scope Reduction: Limits access to only what's necessary, reducing the attack surface.
- Policy-Driven Access Control: Access policies based on roles and responsibilities.
- Secured Zones: Isolated environments for sensitive data, accessible only to authorized users.
-
Data Plane
- Ensures that the policies from the control plane are executed effectively.
- Key components:
- Subject/System: The entity requesting access (e.g., user, workstation, or app).
- Policy Engine: Cross-references access requests with predefined security policies.
- Policy Administrator: Manages and establishes the access policies.
- Policy Enforcement Point: Executes the decision to allow or deny access based on identity verification and policy checks.
Zero Trust Benefits¶
- Enhanced Security: Constantly verifies all entities and transactions, reducing the risk of breaches.
- Adaptability: Meets the needs of modern work environments, like remote work and cloud adoption.
- Risk Reduction: Limits potential damage by ensuring that only necessary permissions are granted, reducing the blast radius of potential breaches.