The major strategic goal of cyber security in the digital age is to combat and mitigate data breaches. A company's data is its most valuable asset to protect.
In the last blog post "This is how IT security works with Zero Trust today" we talked about what Zero Trust is and the rationality behind it.
This article deals with the components of a Zero Trust architecture.
The Zero-Trust model for more effective security is based on the following pillars
Zero Trust Networks
The ability to segment, isolate, and control the network remains an important success factor for Zero Trust. It must be ensured that only certain units (users, applications or devices) with specific requirements may access sensitive network segments or micro perimeters.
Zero Trust Workloads
The workload is a generic term that refers to the entire application stack, which is the sum of all applications. In the broadest sense, it is about monitoring applications and their controlled execution across the enterprise network and in the cloud. As with any other area of zero trust, these connections, applications, and components must be treated as a potential attack vector and equipped with zero-trust control mechanisms and technologies.
Zero Trust Devices
IoT and network-based device technologies have created enormous potential for network and enterprise endangerment. To truly work towards a zero-trust strategy, security professionals need to be able to isolate, secure and control every device and every computer on the network at all times.
Zero Trust Data
One of the pillars of a zero-trust strategy is data security. Securing and managing data, categorising and developing data classification schemes, and encrypting data both in transit and at rest are key components of any zero-trust approach.
Zero Trust People
Companies must also consider the user in the zero trust strategy so that they do not become the gateway to attacks. Most companies today do not know how much power and trust they give users. The ultimate authority of any zero-trust strategy is to restrict users' access, secure login and protect those users while interacting with the company network.
This includes all the technologies required to authenticate users (e.g. multi-factor authentication) and continuous monitoring and controlling of their access and permissions.
“Users, employees, business partners and even customers often do not know what role their actions play in a holistic security strategy.“
Visibility and Analytics
Visibility is the key factor in defending valuable assets of the business, e.g. Data, knowledge, corporate secrets. But you cannot protect the invisible and you cannot fight a threat that you do not see or understand.
Zero Trust requires security teams to maintain visibility and control over their entire digital business environment, regardless of location, device, user count, or hosting model.
Tools such as traditional security information management (SIM) systems or advanced security analytics platforms, as well as security user behavioural analytics (SUBA) and other analytic systems, provide visibility into user activity on the network and the endpoints.
A zero trust platform uses technologies that enable automation and orchestration.
Automation and Orchestration
Analytics in this area has shown how important it is for companies and security teams to leverage tools and technologies that enable automation and orchestration across the enterprise. It must be possible for leading providers of a zero-trust platform to be able to integrate into other systems to use complementary security information or pass on useful data. Conversely, companies must be able to automate their business processes.
Read in the following post, how you can introduce the zero trust platform to your company in 6 simple steps.
About the author: Andreas Fuchs is a product manager at DriveLock SE and an expert carrier for Zero Trust.