Knowledge

Zero trust security model

Source 📝

215:
viewed as compromised. A zero trust architecture (ZTA) is an enterprise's cyber security plan that utilizes zero trust concepts and encompasses component relationships, workflow planning, and access policies. Therefore, a zero trust enterprise is the network infrastructure (physical and virtual) and operational policies that are in place for an enterprise as a product of a zero trust architecture plan.
164:
In 2001 the first version of the OSSTMM (Open Source Security Testing Methodology Manual) was released and this had some focus on trust. Version 3 which came out around 2007 has a whole chapter on Trust which says "Trust is a Vulnerability" and talks about how to apply the OSSTMM 10 controls based on
214:
led to the publication of NIST SP 800-207 – Zero Trust Architecture. The publication defines zero trust (ZT) as a collection of concepts and ideas designed to reduce the uncertainty in enforcing accurate, per-request access decisions in information systems and services in the face of a network
57:
ZTA is implemented by establishing strong identity verification, validating device compliance prior to granting access, and ensuring least privilege access to only explicitly-authorized resources. Most modern corporate networks consist of many interconnected zones,
77:, including checking the identity and integrity of users and devices without respect to location, and providing access to applications and services based on the confidence of user and device identity and device health in combination with user 198:
to denote stricter cybersecurity programs and access control within corporations. However, it would take almost a decade for zero trust architectures to become prevalent, driven in part by increased adoption of mobile and cloud services.
50:. The main concept behind the zero trust security model is "never trust, always verify", which means that users and devices should not be trusted by default, even if they are connected to a permissioned network such as a corporate 236:
recommended that network architects consider a zero trust approach for new IT deployments, particularly where significant use of cloud services is planned. An alternative but consistent approach is taken by
106:) is not a synonym for the zero trust security model or zero trust architecture. Instead, it's a market that consists of remote access products built with zero trust principles, largely derived from the 523: 92:
to resources. In order to determine if access can be granted, policies can be applied based on the attributes of the data, who the user is, and the type of environment using
69:
The reasoning for zero trust is that the traditional approach – trusting users and devices within a notional "corporate perimeter", or users and devices connected via a
597: 126:. Marsh's work studied trust as something finite that can be described mathematically, asserting that the concept of trust transcends human factors such as 715: 238: 233: 658: 211: 291: 473: 449: 404: 161:
article in May 1994, who described firewalls' perimeter defence, as a hard shell around a soft centre, like a Cadbury Egg.
572: 122:
In April 1994, the term "zero trust" was coined by Stephen Paul Marsh in his doctoral thesis on computer security at the
84:
The principles of zero trust can be applied to data access, and to the management of data. This brings about zero trust
750: 609: 62:
and infrastructure, connections to remote and mobile environments, and connections to non-conventional IT, such as
218:
There are several ways to implement all the tenets of ZT; a full ZTA solution will include elements of all three:
745: 311: 93: 687: 662: 89: 631: 73:– is not sufficient in the complex environment of a corporate network. The zero trust approach advocates 168:
In 2003 the challenges of defining the perimeter to an organisation's IT systems was highlighted by the
286: 107: 17: 276: 111: 81:. The zero trust architecture has been proposed for use in specific areas such as supply chains. 70: 123: 74: 545: 149:
The problems of the Smartie or M&M model of the network (the precursor description of
8: 576: 173: 150: 88:
where every request to access the data needs to be authenticated dynamically and ensure
638: 455: 436:. CCRIS '20. New York, NY, USA: Association for Computing Machinery. pp. 123–127. 410: 365: 195: 63: 51: 553: 459: 445: 414: 400: 369: 357: 270: 396: 437: 392: 349: 281: 180: 154: 430:"Dynamic Access Control and Authorization System based on Zero-trust architecture" 353: 338:"The zero trust supply chain: Managing supply chain risk in the absence of trust" 59: 337: 497: 384: 78: 739: 632:"Build Security Into Your Network's DNA: The Zero Trust Network Architecture" 557: 361: 203: 169: 158: 85: 441: 429: 383:
do Amaral, Thiago Melo Stuckert; Gondim, João José Costa (November 2021).
434:
2020 International Conference on Control, Robotics and Intelligent System
96:. This zero-trust data security approach can protect access to the data. 194:
In 2010 the term zero trust model was used by analyst John Kindervag of
657: 188: 46:) describes an approach to the strategy, design and implementation of 241:, in identifying the key principles behind zero trust architectures: 143: 47: 222:
Using enhanced identity governance and policy-based access controls.
172:
of this year, discussing the trend of what was then given the name "
127: 428:
Yao, Qigui; Wang, Qi; Zhang, Xiaojian; Fei, Jiaxuan (2021-01-04).
605: 501: 477: 389:
2021 Workshop on Communication Networks and Power Systems (WCNPS)
139: 254:
Additional context, such as policy compliance and device health
184: 135: 131: 686:
Rose, Scott; Borchert, Oliver; Mitchell, Stu; Connelly, Sean.
187:
started to implement a zero-trust architecture referred to as
666: 385:"Integrating Zero Trust in the cyber supply chain security" 207: 685: 228:
Using overlay networks or software-defined perimeters
312:"Mutual TLS: Securing Microservices in Service Mesh" 546:"Internet hackers beware: corporate LANs protected" 598:"Forrester Pushes 'Zero Trust' Model For Security" 573:"Akamai Bets on 'Zero Trust' Approach to Security" 336:Collier, Zachary A.; Sarkis, Joseph (2021-06-03). 737: 474:"Definition of Zero Trust Network Access (ZTNA)" 427: 382: 257:Authorization policies to access an application 335: 260:Access control policies within an application 54:and even if they were previously verified. 525:Formalising Trust as a Computational Concept 498:"Market Guide for Zero Trust Network Access" 342:International Journal of Production Research 659:National Cybersecurity Center of Excellence 629: 663:"Implementing a Zero Trust Architecture" 183:, a Chinese APT attack throughout 2009, 14: 738: 552:. IDG Network World Inc. 23 May 1994. 292:Identity threat detection and response 570: 521: 245:Single strong source of user identity 234:National Cyber Security Centre (NCSC) 94:Attribute-Based Access Control (ABAC) 595: 24: 708: 679: 651: 589: 25: 762: 564: 206:by cybersecurity researchers at 202:In 2018, work undertaken in the 623: 397:10.1109/WCNPS53648.2021.9626299 110:specification developed by the 630:Kindervag, John (2010-11-05). 538: 515: 490: 466: 421: 376: 329: 304: 13: 1: 354:10.1080/00207543.2021.1884311 297: 7: 571:Loten, Angus (2019-05-01). 264: 232:In 2019 the United Kingdom 10: 767: 287:Secure access service edge 117: 108:software-defined perimeter 751:Computer network security 688:"Zero Trust Architecture" 560:– via Google Books. 100:Zero trust network access 32:zero trust security model 596:Higgins, Kelly Jackson. 225:Using micro-segmentation 716:"Network architectures" 522:Marsh, Stephen (1994), 504:, subscription required 442:10.1145/3437802.3437824 273: – Russian proverb 112:Cloud Security Alliance 90:least privileged access 36:zero trust architecture 746:Information technology 251:Machine authentication 124:University of Stirling 44:perimeterless security 27:Systems security model 153:) was described by a 75:mutual authentication 577:Wall Street Journal 248:User authentication 174:de-perimeterisation 151:de-perimeterisation 639:Forrester Research 196:Forrester Research 612:on 26 August 2021 451:978-1-4503-8805-4 406:978-1-6654-1078-6 348:(11): 3430–3445. 271:Trust, but verify 16:(Redirected from 758: 730: 729: 727: 726: 712: 706: 705: 703: 702: 695:nvlpubs.nist.gov 692: 683: 677: 676: 674: 673: 655: 649: 648: 646: 645: 636: 627: 621: 620: 618: 617: 608:. Archived from 593: 587: 586: 584: 583: 568: 562: 561: 542: 536: 535: 534: 533: 519: 513: 512: 510: 509: 494: 488: 487: 485: 484: 470: 464: 463: 425: 419: 418: 391:. pp. 1–6. 380: 374: 373: 333: 327: 326: 324: 323: 308: 282:Password fatigue 181:Operation Aurora 155:Sun Microsystems 21: 766: 765: 761: 760: 759: 757: 756: 755: 736: 735: 734: 733: 724: 722: 720:www.ncsc.gov.uk 714: 713: 709: 700: 698: 690: 684: 680: 671: 669: 656: 652: 643: 641: 634: 628: 624: 615: 613: 594: 590: 581: 579: 569: 565: 544: 543: 539: 531: 529: 520: 516: 507: 505: 496: 495: 491: 482: 480: 472: 471: 467: 452: 426: 422: 407: 381: 377: 334: 330: 321: 319: 310: 309: 305: 300: 267: 179:In response to 120: 28: 23: 22: 15: 12: 11: 5: 764: 754: 753: 748: 732: 731: 707: 678: 650: 622: 588: 563: 537: 514: 489: 465: 450: 420: 405: 375: 328: 302: 301: 299: 296: 295: 294: 289: 284: 279: 274: 266: 263: 262: 261: 258: 255: 252: 249: 246: 230: 229: 226: 223: 165:Trust levels. 157:engineer in a 119: 116: 79:authentication 60:cloud services 26: 9: 6: 4: 3: 2: 763: 752: 749: 747: 744: 743: 741: 721: 717: 711: 696: 689: 682: 668: 664: 660: 654: 640: 633: 626: 611: 607: 603: 599: 592: 578: 574: 567: 559: 555: 551: 550:Network World 547: 541: 527: 526: 518: 503: 499: 493: 479: 475: 469: 461: 457: 453: 447: 443: 439: 435: 431: 424: 416: 412: 408: 402: 398: 394: 390: 386: 379: 371: 367: 363: 359: 355: 351: 347: 343: 339: 332: 317: 316:The New Stack 313: 307: 303: 293: 290: 288: 285: 283: 280: 278: 275: 272: 269: 268: 259: 256: 253: 250: 247: 244: 243: 242: 240: 235: 227: 224: 221: 220: 219: 216: 213: 209: 205: 204:United States 200: 197: 192: 190: 186: 182: 177: 175: 171: 170:Jericho Forum 166: 162: 160: 159:Network World 156: 152: 147: 145: 141: 137: 133: 129: 125: 115: 113: 109: 105: 101: 97: 95: 91: 87: 86:data security 82: 80: 76: 72: 67: 65: 61: 55: 53: 49: 45: 41: 37: 33: 19: 723:. Retrieved 719: 710: 699:. Retrieved 694: 681: 670:. Retrieved 653: 642:. Retrieved 625: 614:. Retrieved 610:the original 602:Dark Reading 601: 591: 580:. Retrieved 566: 549: 540: 530:, retrieved 528:, p. 56 524: 517: 506:. Retrieved 492: 481:. Retrieved 468: 433: 423: 388: 378: 345: 341: 331: 320:. Retrieved 318:. 2021-02-01 315: 306: 277:Blast radius 231: 217: 201: 193: 178: 167: 163: 148: 121: 103: 99: 98: 83: 68: 56: 43: 39: 35: 31: 29: 740:Categories 725:2020-08-25 701:2020-10-17 672:2022-07-22 644:2022-07-22 616:2022-02-17 582:2022-02-17 532:2022-07-22 508:2024-07-30 483:2024-07-30 322:2021-02-20 298:References 189:BeyondCorp 136:lawfulness 66:devices. 48:IT systems 18:Zero trust 558:0887-7661 460:230507437 415:244864841 370:233965375 362:0020-7543 144:judgement 265:See also 128:morality 606:Informa 502:Gartner 478:Gartner 140:justice 118:History 114:(CSA). 697:. NIST 556:  458:  448:  413:  403:  368:  360:  185:Google 142:, and 132:ethics 42:) and 34:(also 691:(PDF) 635:(PDF) 456:S2CID 411:S2CID 366:S2CID 212:NCCoE 667:NIST 554:ISSN 446:ISBN 401:ISBN 358:ISSN 239:NCSC 210:and 208:NIST 104:ZTNA 30:The 438:doi 393:doi 350:doi 176:". 71:VPN 64:IoT 52:LAN 40:ZTA 742:: 718:. 693:. 665:. 661:. 637:. 604:. 600:. 575:. 548:. 500:. 476:. 454:. 444:. 432:. 409:. 399:. 387:. 364:. 356:. 346:59 344:. 340:. 314:. 191:. 146:. 138:, 134:, 130:, 728:. 704:. 675:. 647:. 619:. 585:. 511:. 486:. 462:. 440:: 417:. 395:: 372:. 352:: 325:. 102:( 38:( 20:)

Index

Zero trust
IT systems
LAN
cloud services
IoT
VPN
mutual authentication
authentication
data security
least privileged access
Attribute-Based Access Control (ABAC)
software-defined perimeter
Cloud Security Alliance
University of Stirling
morality
ethics
lawfulness
justice
judgement
de-perimeterisation
Sun Microsystems
Network World
Jericho Forum
de-perimeterisation
Operation Aurora
Google
BeyondCorp
Forrester Research
United States
NIST

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.