Dr. Erdal Ozkaya
Search
  • Home
  • About Me
  • Home
  • About Me
  • Home
  • General
  • Zero Trust Network Security

Zero Trust Network Security

What is Zero Trust Network
Erdal2021-06-21T16:05:01-04:00

Zero Trust Network Security

Table of Contents

  • Zero Trust Network Security
  • Planning zero trust network adoption
  • You can organize your approach to Zero Trust around these key technology pillars:
  • Zero Trust Principles you need know
  • From security perimeter to zero trust

If you remember later 90’s early 2000’s everything was based on “default allow” , which was abused  easily by Threat actors as it was working based on allowing unknown files and apps to access enterprises ; we still see many organizations or individuals getting effected by cyber attacks. This is how Zero Trust started to get attraction. So what is Zero Trust ? What do you need yo know about Zero trust network or Zero Trust network security ? Lets start with the basics :

A terminology that has been growing substantially over the years is the concept of a zero trust network. The whole idea of this name is to debunk the old mentality that there are “trusted networks”. In the past, most network diagrams were created by using a perimeter, the internal network (also known as a trusted network) and the external network (also known as an untrusted network). The zero trust network approach basically means: all networks (internal and external) are not trustable, all networks by nature can be considered a hostile place, where attackers may already reside.

To build a zero trust network you need to assume that threats exist, regardless of the location, and that user’s credentials can be compromised, which means that attackers might already be inside of your network. As you can see, a zero trust network is more a concept and approach to network security than a technology per se. Many vendors will advertise their own solution to achieve a zero trust network, but at the end of the day, a zero trust network is broader than just a piece of technology sold by a vendor.

One common way to implement a zero trust network is to use the device and the user’s trust claims to gain access to a company’s data. If you think about it, the zero trust network approach leverages the concept that “Identity is your new Perimeter”, Chasing a User’s Identity. Since you can’t trust any network, the perimeter itself becomes less important than it was in the past, and the identity becomes the main boundary to be protected.

To implement a zero trust network architecture, you need to have at least the following components:

  • An identity provider Device directory
  • Conditional policy
  • An access proxy that leverages those attributes to grant or deny access to resources

The great advantage of this approach is that a user, when logged in from a certain location and from a certain device, may not have access to a specific resource, compared to if the same user was using another device and was logged in from another location in which they could have access. The concept of dynamic trust based on those attributes enhances the security based on the context of access to a particular resource. As a result, this completely changes the fixed layers of security used in a traditional network architecture.

Microsoft Azure Active Directory (Azure AD) is an example of an identity provider that also has conditional policy built-in, the capability to register devices, and being used as an access proxy to grant or deny access to resources.

Planning zero trust network adoption

The implementation of a zero trust network is literally a journey, and many times this can take months to be fully realized. The first step is to identify your assets, such as data, applications, devices, and services. This step is very important, because it is those assets that you will help you to define the transaction flows, in other words, how these assets will communicate. Here, it is imperative to understand the history behind the access across these assets and establish new rules that define the traffic between these assets.

These are just some examples of questions that will help you to determine the traffic flow, the conditions, and ultimately the boundaries of trust. The next step is to define the policies, the logging level, and the control rules. Now that you have everything in place, you can start working on:

  • Who should have access to the set of apps that were defined?
  • How will these users access this app?
  • How this app communicates with the backend server?
  • Is this a native cloud app? If so, how does this app authenticate?
  • Will the device location influence data access? If so, how?

The last part is to define the systems that are going to actively monitor these assets and communications. The goal is not only for auditing purposes, but also for detection purposes. If malicious activity is taking place, you must be aware as fast as possible.

Having an understanding of these phases is critical, because in the implementation phase you will need to deal with a vendor’s terminologies and technologies that adopt the zero trust network model. Each vendor may have a different solution, and when you have a heterogeneous environment, you need to make sure the different parts can work together to implement this model.

You can organize your approach to Zero Trust around these key technology pillars:

  • Secure networks with Zero Trust
  • Secure identity with Zero Trust
  • Secure endpoints with Zero Trust
  • Secure applications with Zero Trust
  • Secure data with Zero Trust
  • Secure infrastructure with Zero Trust
  • Visibility, automation, and orchestration with Zero Trust

Zero Trust Principles you need know

From security perimeter to zero trust

The traditional approach of access control for IT has been based on restricting access to a corporate network and then supplementing it with more controls as appropriate. This model restricts all resources to a corporate owned network connection and has become too restrictive to meet the needs of a dynamic enterprise.

Zero trust shift

Microsoft Zero Trust : https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/secure/access-control#known-trusted-allowed

Organizations must embrace a zero trust approach to access control as they embrace remote work and use cloud technology to digitally transform their business model, customer engagement model, employee engagement, and empowerment model.

Zero trust principles help establish and continuously improve security assurances, while maintaining flexibility to keep pace with this new world. Most zero trust journeys start with access control and focus on identity as a preferred and primary control while they continue to embrace network security technology as a key element. Network technology and the security perimeter tactic are still present in a modern access control model, but they aren’t the dominant and preferred approach in a complete access control strategy.

Microsoft Zero Trust guidance center : https://docs.microsoft.com/en-us/security/zero-trust/

Zero trust network security
Zer0 Trust Network security

More Zero trust Articles and Videos

https://www.erdalozkaya.com/?s=zero+trust

Hacker Combat Zero Trust

https://hackercombat.com/zero-trust-architecture-and-its-relevance-in-cybersecurity/

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *


Related Posts

Why the 'Basement Hacker' Stereotype Is Wrong — and Dangerous

Why the Basement Hacker Stereotype Is Wrong — and Dangerous

Why the Basement Hacker Stereotype Is Wrong — and Dangerous Post Originally published at Dark Reading by Micah Babinski ,... read more
Security Intelligence

Microsoft Network Engineer : Great 0pportunity

Would you like to work for Microsoft in Jordan or Egypt.. If your CV fits the below skills reach... read more
Council of the European

Council of the European Union ” 12 new Reading Refences “

An introduction to Cybersecurity by Council of the European Union Cybersecurity is becoming a more crucial topic in both policy making... read more
𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐧𝐬𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐮𝐦𝐦𝐢𝐭 𝐒𝐨𝐮𝐭𝐡𝐞𝐚𝐬𝐭 𝐀𝐬𝐢𝐚

Digital Transformation Summit Southeast Asia , 2021 join us for Free

𝐃𝐢𝐠𝐢𝐭𝐚𝐥 𝐓𝐫𝐚𝐧𝐬𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐒𝐮𝐦𝐦𝐢𝐭 𝐒𝐨𝐮𝐭𝐡𝐞𝐚𝐬𝐭 Asia Business leaders must be prepared to handle complexity and scale for the future now more than... read more
World CIO 200

World CIO Summit – 2021 Great networking opportunities

World CIO Summit Its the time again, to end the year with a great event, since 2018 , I am proud... read more
Remove Virus from your computer

Remove Virus from your computer, secure it back easily !

Remove Virus from your computer, secure it back easily ! WHAT IS A COMPUTER VIRUS? Computer virus is a computer program which... read more

Windows 10 H2 Update – get it now

Windows 10 H2 Update Update  as 19 November , thank you for reaching out and notifying me the images are missing...... read more
Global CISO Forum Logo

Global CISO Forum -Community which is better together

Global CISO Forum The Global CISO Forum was launched on 26 May during GEC Media’s Security Symposium 2021. Anushree Dixit, Global... read more
Speaking at IDC Summit Erdal

Speaking at IDCs Middle East CIO Summit 2021 –

Speaking at IDC I am pumped to announce that I will speaking at the IDC's Middle East CIO Summit ... When :February... read more
CyberTech 21 NYC Dr Erdal Ozkaya

CYBERTECH NEW YORK 2021 – Opportunity to network

CyberTech New York City 2021 With 372,000 jobs in 2019 and $16.2B in funding in 2020, there’s no doubt about it -... read more

Categories

  • About Dr Erdal Ozkaya (298)
    • Awards (96)
    • Erdal in the news (118)
    • Feedback (90)
    • My Books (54)
    • Who is Dr Erdal Ozkaya ? (2)
  • Announcemets (302)
  • Artificial Intelligence AI (10)
  • Certification (52)
  • Cloud Computing (72)
  • Cybersecurity (322)
  • Cybersecurity Leadership (52)
  • Financial Sector (31)
  • Forensics (17)
  • Free Events (156)
  • General (133)
  • How to …? (63)
  • ISO 2700x (12)
  • News (38)
  • Reviews (77)
    • Book Reviews (33)
    • Free E-Books (13)
    • Hardware Review (9)
    • Security Review / Reports (10)
    • Software Review (8)
  • Video Tutorials (101)
  • What is new? (27)
  • Windows (30)

Recent Comments

  • Erdal on Free EDR Certification Training
  • SANDEEP SHRIVASTAV on Free EDR Certification Training
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Alicia Harlow on Core isolation Memory Integrity not available – (Get it fixed)
  • Erdal on Siber Güvenlik Saldiri ve Savunma Stratejileri – NEW B00K

Archives

Dr. Erdal Ozkaya © Copyright 2023. All Rights Reserved.