CyberOne Blog | Cyber Security Trends, Microsoft Security Updates, Advice

What is a Zero Trust Network?

Written by Mark Terry | Jan 29, 2020 12:00:00 AM

In the past 10 years, the network has changed, and security has changed. Both consumers and businesses consume and use cloud services. We’re all mobile, using multiple devices from multiple locations, which in turn kicked off an explosion of very real security risks. First coined in 2010 by an Analyst at Forrester Research Inc., a Zero Trust Network provides a new approach to network security, fit for today’s complex cloud/mobile/hybrid networks.

So what was wrong with the ‘old’ approach to network security?

Zero Trust Networks – An Overview

Firstly, a Zero-Trust Network is not a specific technology or service. Rather, it is a holistic network security approach in which every person and device trying to access resources requires strict identity verification, whether seated inside the network perimeter or outside.

To put zero trust security into context, traditional network security adopts a “castle-and-moat” principle. Everyone inside the “castle” is trusted (by default), with the “moat” making it hard to gain access from the outside.

By default, no one is trusted in a zero–trust network, whether inside or outside the network. Verification is required to gain access to network resources, typically with Multi-Factor Authentication (MFA).

What’s the Problem With a “Castle-And-Moat”?

The primary problem is that with a castle, once an attacker has scaled the wall (unpatched software), or broken a window (hacked password), they have a free reign to walk around unchallenged. How often have you heard hackers say they’d been inside the network for over 6 months, undetected (as with Travelex)? Today’s corporate network is not a castle. Data is both in the data centre and the cloud. Employees access data from multiple locations, using various devices.

Security Challenges

Today, managing and maintaining network security controls has become much more difficult. The advent of 5G will only accelerate this change. Therefore, IT must protect an increasingly complex and porous security perimeter, perhaps supported by security monitoring technologies (SIEM) and a dedicated security team (SOC)to detect and isolate unauthorised activity.

What Is a Zero Trust Network – Just a “New” Approach?

Rather than hardening your security defences, a Zero-Trust Network assumes that no users or devices should be automatically trusted. The principle of least privilege ensures that only the minimum required access level is provided to an individual. Access is only provided to the permitted files, applications, or services on an individual, granular level. To explain the difference, consider when you visit a company.

Traditional “Castle-And-Moat” Security

Zero Trust Security

You visit Reception and they assign you a “visitor” pass.

After a quick bathroom freshen-up, you give yourself a guided tour of their offices. Of course, the server room is (probably) locked, but you can freely enter any room, talk to anyone, and sit down at any PC.

The only question is whether any ‘security-minded’ individual challenges you?

You visit Reception, and they assign you a “visitor” pass, uniquely identifying “YOU.” Your pass provides granular access to specific rooms, facilities and services, which, as a visitor, does not give much access at all!

Wherever you wandered in the building, the door would be locked, unless you entered the specific meeting room you had been given access to. In that room, you could only access the services you had been granted.

Zero Trust provides an additional layer of trust protection and is a better fit for today’s cloud and mobile-enabled networks, which are, by nature, much more complex, porous and harder to protect.

The Importance of Identity & Device Management

With so much emphasis placed on verified user identity, it is natural that Multi-factor authentication (MFA) is also a core value of Zero Trust Security to provide sufficient evidence that the user is who they claim to be. In addition to Identity Management, a Zero-Trust Network also requires strict Device Access Management to ensure only authorised devices are used.

The 10 Principles of a Zero Trust Network

“Remove inherent trust from the network, treat it as hostile and instead gain confidence that you can trust a connection” – NCSC, November 2019. www.ncsc.gov.uk/blog-post/zero-trust-architecture-design-principles

Firstly, To Summarise:

  • A Zero-Trust Network assumes attackers exist within and outside the network. No users or devices are automatically trusted.
  • A principle of least privilege. Users are only given as much access as they need, minimising exposure to sensitive parts of the network.
  • Granular micro-segmentation. Zero Trust Networks break up security into granular zones to limit access.

Zero Trust Network Principles

  1. Know your IT architecture, including users, devices, and services
  2. Create a single, strong user identity
  3. Create a strong device identity
  4. Authenticate everywhere
  5. Know the health of your devices and services
  6. Focus your monitoring on devices and services
  7. Set policies according to the value of the service or data
  8. Control access to your services and data
  9. Don’t trust the network, including the local network
  10. Choose services designed for zero Trust

The journey to a Zero Trust may seem like a sizeable change from established strategies. Several security technology providers already support Zero Trust principles, often using Multi-Factor Authentication (MFA) and Identity Access Management (IAM) and implementing micro-segmentation in parts of their environment. But Zero Trust isn’t just about implementing individual technologies. Zero Trust is a new way of thinking, requiring an ongoing strategy. And as such, it is more of a journey than a destination - but a worthwhile journey, nonetheless.

Take the Next Step

CyberOne is the UK’s leading Zscaler partner, providing our clients with fully managed services and 24x7 support. No one knows Zscaler like CyberOne does. Our dedicated team of experts is always on hand to answer any questions. Contact us today...