top of page
Search
Writer's pictureNikhil Gowda

Zero Trust Model – “Never trust, always verify”

One of the newest phrases in cybersecurity is "zero trust." It's critical to comprehend both what Zero Trust is and what it is not. Zero Trust is a strategic project that aims to eliminate the concept of trust from an organization's network architecture in order to assist avoid successful data breaches. Zero Trust is aimed to safeguard modern digital environments by using network segmentation, blocking lateral movement, offering Layer 7 threat prevention, and simplifying granular user-access management. It is based on the philosophy of "never trust, always verify."


During his time as a vice president and lead analyst at Forrester Research, John Kindervag developed Zero Trust after realising that standard security approaches are built on the antiquated premise that everything inside an organization's network should be trusted. It is assumed that a user's identity is not compromised and that all users act responsibly and can be trusted in this broken trust paradigm. Trust is a weakness, according to the Zero Trust paradigm. Users, including threat actors and malevolent insiders, are free to travel around the network and access or exfiltrate whatever data they want once they're connected. It's important to remember that the point of infiltration for an attack isn't always the target area.




You find a "protect surface" in Zero Trust. The network's most vital and valuable data, assets, applications, and services – or DAAS for short – make up the protect surface. Each organization's protect surfaces are different. The protect surface is orders of magnitude smaller than the attack surface, and it is always knowable, because it only contains what is most vital to an organization's activities. You can determine how traffic moves across the company in relation to your protect surface once you've identified it. The only way to determine and enforce policy that ensures secure access to your data is to know who your users are, what applications they use, and how they connect. Once you've figured out how the DAAS, infrastructure, services, and users are all interconnected, you should put controls in place as close to the protect surface as feasible, thus constructing a microperimeter around it. Wherever the protect surface goes, this microperimeter moves with it. A segmentation gateway, also known as a next-generation firewall, can be used to build a microperimeter by limiting access to the protect surface to only known, approved traffic or valid.


With granular Layer 7 policy based on the Kipling Method, which creates Zero Trust policy based on who, what, when, where, why, and how, the segmentation gateway gives granular insight into traffic and imposes extra layers of inspection and access control. The Zero Trust policy specifies who can transit the microperimeter at any given time, preventing unwanted users from accessing your protected surface and sensitive data from being exfiltrated. Only at Layer 7 is zero trust conceivable.


Getting to Zero Trust is frequently seen to be expensive and difficult. Zero Trust, on the other hand, is built on top of your existing architecture and does not necessitate the replacement of existing technologies. There aren't any Zero Trust items on the market. There are zero-trust goods that work well and zero-trust products that don't. Using a simple five-step technique, Zero Trust is also very easy to adopt, implement, and maintain. This step-by-step procedure will help you figure out where you are and where you want to go next:

1. Identify the protect surface

2. Map the transaction flows

3. Build a Zero Trust architecture

4. Create Zero Trust policy

5. Monitor and maintain

To learn more about Zero Trust and implementing it within your organization, visit us at cybersecuritylink.com.au.

93 views0 comments

Recent Posts

See All

Comments


Post: Blog2_Post
bottom of page