Implementig A Zero Trust Architecture
Implementig A Zero Trust Architecture
IMPLEMENTING A
ZERO TRUST
ARCHITECTURE
Alper Kerman
Oliver Borchert
Scott Rose
Eileen Division
Allen Tan
October 2020
nccoe-zta-project@list.nist.gov
ABSTRACT
The proliferation of cloud computing, mobile device use, and the Internet of Things has
dissolved conventional network boundaries. The workforce is more distributed, with remote
workers who need access to resources anytime, anywhere, and on any device, to support the
mission. Enterprises must evolve to provide secure access to company resources from any
location and asset, protect interactions with business partners, and shield client-server as well
as inter-server communications.
A zero trust cybersecurity approach removes the assumption of trust typically given to devices,
subjects (i.e., the people and things that request information from resources), and networks. It
focuses on accessing resources in a secure manner, regardless of network location, subject, and
asset, and enforcing risk-based access controls while continually inspecting, monitoring, and
logging interactions. This requires device health attestation, data-level protections, a robust
identity architecture, and strategic micro-segmentation to create granular trust zones around an
organization’s digital resources. Zero trust evaluates access requests and communication
behaviors in real time over the length of open connections, while continually and consistently
recalibrating access to the organization’s resources. Designing for zero trust enables enterprises
to securely accommodate the complexity of a diverse set of business cases by informing virtually
all access decisions and interactions between systems and resources.
This NCCoE project will show a standards-based implementation of a zero trust architecture
(ZTA). Publication of this project description begins a process that will further identify project
requirements and scope, as well as the hardware and software components to develop
demonstrations. The NCCoE will build a modular, end-to-end example ZTA(s) using commercially
available technology that will address a set of cybersecurity challenges aligned to the NIST
Cybersecurity Framework. This project will result in a freely available NIST Cybersecurity Practice
Guide.
KEYWORDS
cybersecurity; enterprise; identity and access management; network security; remote access;
zero trust; zero trust architecture
DISCLAIMER
Certain commercial entities, equipment, products, or materials may be identified in this
document in order to describe an experimental procedure or concept adequately. Such
identification is not intended to imply recommendation or endorsement by NIST or NCCoE, nor
is it intended to imply that the entities, equipment, products, or materials are necessarily the
best available for the purpose.
TABLE OF CONTENTS
1 Executive Summary..........................................................................................................3
Purpose ..................................................................................................................................... 3
Scope ......................................................................................................................................... 3
Challenges ................................................................................................................................. 4
Background ............................................................................................................................... 4
2 Scenarios .........................................................................................................................5
Scenario 1: Employee Access to Corporate Resources ............................................................. 5
Scenario 2: Employee Access to Internet Resources ................................................................ 5
Scenario 3: Contractor Access to Corporate and Internet Resources ...................................... 6
Scenario 4: Inter-server Communication Within the Enterprise .............................................. 6
Scenario 5: Cross-Enterprise Collaboration with Business Partners......................................... 6
Scenario 6: Develop Trust Score/Confidence Level with Corporate Resources ....................... 6
3 High-Level Architecture ....................................................................................................6
Component List ......................................................................................................................... 7
Desired Security Characteristics and Properties....................................................................... 8
4 Relevant Standards and Guidance ....................................................................................9
5 Security Control Map .....................................................................................................11
Appendix A References.......................................................................................................15
2 SCENARIOS
Responses from industry organizations that express interest in taking part in this project will
affect the potential scenario-set in terms of the composition and number of scenarios
demonstrated. These scenarios encapsulate the notion of providing subjects access to corporate
resources hosted on premise or in the cloud. Access requests may come from within the
enterprise network or the public internet, in the case of teleworkers. It is assumed the
enterprise is implementing a ZTA within an existing typical corporate environment.
Scenario 1: Employee Access to Corporate Resources
An employee is looking for easy and secure access to corporate resources, from any work
location. This scenario will demonstrate a specific user experience where an employee attempts
to access corporate services such as the corporate intranet, a time-and-attendance system, and
other human resources systems by using either an enterprise-managed device or a personally
owned device. The ZTA solution implemented in this project will enforce the associated access
request, dynamically and in near real-time. The employee will be able to perform the following:
• Access on-premise corporate resources while connected from the corporate intranet.
• Access corporate resources in the cloud while connected directly from the corporate
intranet.
• Access on-premise corporate resources while connected from a branch office.
• Access corporate resources in the cloud while connected from a branch office.
• Access on-premise corporate resources from the public internet while teleworking.
• Access corporate resources in the cloud from the public internet while teleworking.
Scenario 2: Employee Access to Internet Resources
An employee is trying to access the public internet to accomplish some tasks. This scenario will
show a specific user experience where an employee attempts to access an enterprise-
sanctioned, web-based service on the internet by using an enterprise-managed device. Although
the web-based service is not owned and managed by the enterprise, the associated access
request for that resource will still be enforced, dynamically and in real time, by a ZTA solution
implemented in this project. The solution will manage the employee’s access, regardless of
location. That is, the employee can access the internet while connected inside the corporate
intranet, a branch office, or the public internet by using an enterprise-managed device.
If an employee is allowed by corporate policy to access non-enterprise-managed resources and
services in the public internet by using enterprise-managed devices, the ZTA solution will allow
the enterprise to determine the extent of this access.
Examples of access restrictions in the above paragraph could include:
• Access to social media sites is not sanctioned.
3 HIGH-LEVEL ARCHITECTURE
Figure 1 illustrates a high-level, notional architecture of the logical and functional components
that could make up a ZTA for a typical IT enterprise.
Component List
The technical components required of the ZTA solution(s) for this project include but are not
limited to:
Core Components:
• The policy engine handles the ultimate decision to grant, deny, or revoke access to a
resource for a given subject. The policy engine calculates the trust scores/confidence
levels and ultimate access decisions.
• The policy administrator is responsible for establishing/terminating the transaction
between a subject and a resource. It generates any session-specific authentication and
authentication token or credential used by a client to access an enterprise resource. It is
closely tied to the policy engine and relies on its decision to ultimately allow or deny a
session.
• The policy enforcement point handles enabling, monitoring, and eventually terminating
connections between a subject and an enterprise resource.
Functional Components:
• The data security component includes all the data access policies and rules that an
enterprise develops to secure its information, and the means to protect data at rest and
in transit.
• The endpoint security component encompasses the strategy, technology, and
governance to protect endpoints (e.g., servers, desktops, mobile phones, IoT devices)
from threats and attacks, as well as protect the enterprise from threats from managed
and unmanaged devices.
• The identity and access management component includes the strategy, technology, and
governance for creating, storing, and managing enterprise user (i.e., subject) accounts
and identity records and their access to enterprise resources.
PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions.
PR.DS-6
Integrity-checking mechanisms are used to verify software, firmware, and information
integrity.
PR.DS-8: Integrity-checking mechanisms are used to verify hardware integrity.
Information Protection PR.IP-1: A baseline configuration of IT/industrial control systems is created and maintained,
Processes and Procedures incorporating security principles (e.g., concept of least functionality).
(PR.IP)
Security Continuous DE.CM-1: The network is monitored to detect potential cybersecurity events.
Monitoring
DE.CM-2: The physical environment is monitored to detect potential cybersecurity events.
(DE.CM)
DE.CM-4: Malicious code is detected.