What Exactly is Zero-Trust Architecture

By Aaron Branson, Netsurion

Zero Trust is a concept that has gained popularity due to the ongoing evolution of the cyber-threat landscape. These attacks are now persistent, they're sophisticated, and, in many cases, because of the blurring of the perimeter, difficult to detect or distinguish an “insider” versus an “outsider”. Remote access has become a must, and this has made for complex IT environments.

Traditionally, it was assumed that there was a well-defined network perimeter. Either you were inside the company, inside the firewall if you like, or you were on the outside. And once you’re in, you have free access to all the resources inside the network. And this was appropriate for a simpler time where remote access was not so common and necessary. But since then, zero-trust architecture has come into vogue.

Now, you should authenticate and authorize every interaction. So regardless of whether it’s a user or it’s a device, there is really no concept of an “inside” or an “outside”. If that user or that device wants to access a network resource, authentication authorization is a must.

Cyber-attacks can originate from inside or outside. Today, you can’t necessarily tell what’s inside or what’s outside. 

 
The Differences Between Traditional Architecture and Zero-Trust Architecture
 
How Does Zero-Trust Architecture Work?

Well, the way it works is by using a security policy which you define, which gets applied by a trust algorithm which will ultimately grant or deny access to a resource by either a user or a device.

In addition to the algorithm, you need an identity credential system where you have identified “who’s who in the zoo” and what can they do. You need security analytics. This means you’re collecting logs; you’re looking at user and entity behavior analytics (UEBA), and you’re considering threat intelligence. Of course, you have endpoints and so endpoint security as well. And then as I mentioned, all traffic inside is in fact encrypted.

 
How Does Zero-Trust Benefit My Business?

What’s the upside of a zero-trust architecture coupled with the aforementioned security monitoring? Well, for the one thing you will limit the blast radius. You know that an attack is inevitable, right? Assume breach is the paradigm, so when it occurs you will confine the security incident to the smallest possible blast radius. And this is very important because perfect protection is simply not practical.

The second benefit is improved situational awareness. Even if no blast has occurred, you know, because of the continuous monitoring that goes on, what’s normal, what’s occurring, what’s and happening inside your network. And this is very important to identify what’s out of ordinary or first time seen.

And thirdly, your data confidentiality is improved as it is less likely that your data is going to end up on the dark web. Hopefully, this sheds a little more light on the basics of Zero-Trust Architecture and why its important to your business.