Page 35 - Informatics
P. 35

Technology Update


         Zero Trust Architecture


         Framework to Strengthen Structural Security of Modern Enterprise





         Edited by MOHAN DAS VISWAM            raditional  security  in  based  on  the  concept  of   ed on a per session basis
                                               trusted  and  untrusted  zones.  These  zones  are   •  Access  to  resources  is  determined  by  dynamic
                                            Tdefined  by  physical  or  logical  perimeter  pro-  policy - including the observable state of client
         Zero Trust Architecture or ZTA     tected by security devices like firewall. Any device/   identity, application, and the requesting asset -
                                            user inside the perimeter is treated as trusted and   and may include other behavioural attributes
         is an infrastructure design        is allowed access to internal resources by default. An   •  The enterprise ensures that all owned and associ-
                                            example of such a design is a typical office network   ated devices are in the most secure state possible
         philosophy based on the            local area network (LAN). Any device/ user inside the   and monitors assets to ensure that they remain in
         principle of ‘never trust, always   office LAN is allowed access to the internal office re-  the most secure state possible
                                            sources like eOffice, eFiles, eHRMS, network printers,   •  All resource authentication and authorisation are
         verify’. It debunks the typical    or any other computer/ server within the LAN. This   dynamic and strictly enforced before access is al-
                                            design assumes that all devices/users within the of-  lowed
         ‘castle-and-moat’ style perimeter   fice LAN are genuine and authorised. It also assumes   •  The  enterprise  collects  as  much  information  as
                                            that all programs running within these devices are   possible about the current state of network in-
         security and intends to handle     safe  and  non-malicious.  However,  with  high  speed   frastructure and communications and uses it to
                                            internet access on these devices, we have seen time   improve its security posture
         newer threats of privilege         and again that these trusted devices/ programs can
         misuse, internal breaches          very  easily  be  compromised  by  the  well-resourced  Pillars of Zero Trust Architecture
                                            adversaries to launch various attacks on the internal   We need to understand the type of resources in
         and lateral movement from          resources like unauthorised access, data exfiltration,   an IT ecosystem in order to be able to protect them
                                            internal network control, etc. They take advantage of   and move toward zero trust.
         within the trusted inside. Zero    the design which implicitly trusts anyone and every-  Typically,  an  environment  consists  of  people
                                            one which happen to get an entry into the trusted
         Trust Architecture de!nes a        zone.                              (workforce), devices (workplace), network (work-ar-
                                                                               ea) and servers (workload). A zero trust model has to
                                               Zero  Trust  design  principle  aims  to  overcome
         framework for structural cyber     this weakness and create a design based on actual   identify and separate these components and define
                                                                               dynamic/adaptive policies around them. The pillars
         security of modern enterprises.    verification of devices/users and continuous moni-
                                            toring of resource accessed by them. The first step
         It combines some of the already    is to identify and enumerate internal resources and
                                            define  micro-perimeters  (also  called  Software-de-  ZeroTrust
         well known and established         fined  Perimeter  or  SDP)  around  them.  The  idea  is   Architecture
                                            to verify each and every request for the resources,
         security guidelines and            continuously  monitor  and  change  access  control
         highlights them as the basic of    policies based on change in access parameters. The
                                            request for resources can originate from either the
         tenets of the framework.           internal LAN or remote workers using Virtual Private
                                            Network (VPN). The concept of Zero Trust has been   People   (Workforce)  Devices  (Workplace)  Network  (Workarea)  Servers  (Workload)
                                            there for a long time in silos. However, the term was
                                            coined by John Kindervag in 2010, during his tenure
                                            as a vice president and principal analyst for Forrester
                                            Research, for the complete framework encompass-
                                            ing  various  IT  operation  silos  and  technologies  to
                                            achieve new age structural security.
                                                                               of ZTA as defined by Forrester’s Zero Trust eXtended
                                            Tenets of Zero Trust               model are as follows,
                                               Zero Trust Architecture defines a framework for   •  Data security: encryption and secure access
                        Ashish Agarwal      structural  cyber  security  of  modern  enterprises.  It   Take a zero-trust approach to securing data by pro-
                        Sr. Technical Director  combines some of the already well known and es-  tecting  the  new,  extended  perimeter:  classify  and
                        ashish@nic.in       tablished  security  guidelines  and  highlights  them   categorise data; authorise user and device access to
                                            as the basic of tenets of the framework. The basic   data; prevent data loss and exfiltration; and encrypt
                                            tenets of the ZTA are enumerated below,  emails and device data.
                                            •  All data sources and computing services are con-  •  Network security: prevent and contain breaches
                                              sidered resources
                        Syed Hasan          •  All communication is secured regardless of net-  on the network
                        Mahmood               work location                    By segmenting access across your network, you can
                        Scientist-’C’       •  Access to individual enterprise resources is grant-  better isolate and control critical areas of your net-
                        hasan@nic.in                                           work to contain breaches and prevent lateral move-



                                                                                        April 2020  informatics.nic.in 35
   30   31   32   33   34   35   36   37   38   39   40