Zero Trust Framework
Zero Trust Framework
Zero Trust is a security framework based on the principle of 'never trust, always verify'. It advocates
for access management system with continuous authentication and authorization of every user,
device, network flow and connection regardless of their location or network connectivity based on
policies using context from as many data sources as possible, to allow only secure access and mitigate
the risk of any cyber-attack.
Source: https://r.search.yahoo.com/_ylt=Awrx.Plp.Oll4g4ckpHGHAx.;_ylu=c2VjA2ZwLWF0dHJpYgRzbGsDcnVybA--
/RV=2/RE=1709861097/RO=11/RU=https%3a%2f%2fcyberhoot.com%2fcybrary%2fcastle-and-moat-
Identity
The foundation of Zero Trust is identity, which emphasizes confirming and authenticating
each user's identity prior to allowing access to resources. Its objectives are to reduce the
possibility of unauthorised access and guarantee personal accountability. Always explicitly
authenticate and authorize based on all available data points, including user identity,
location, device health, service or workload, data classification, and anomalies.
Implementation Strategies:
✓ Multi-Factor Authentication (MFA)
✓ Identity and Access Management (IAM) Solutions
✓ Continuous Authentication
Devices
The goal is to keep the network trustworthy by preventing compromise and maintaining the
security of endpoints and devices. To defend against threats originating from devices, it entails
constant monitoring and the enforcement of security regulations.
Implementation Strategies:
✓ Security Information and Event Management (SIEM)
✓ Endpoint Protection Platforms (EPP)
✓ Mobile Device Management (MDM)
✓ Device Hardening
Networks
Zero Trust security assumes that security risks are present both inside and outside the network.
Nothing inside the network is trusted by default. The networks defense area focuses on
establishing secure communication channels and implementing micro segmentation to limit
lateral movement and contain breaches within the network.
Implementation Strategies:
✓ Micro-Segmentation
✓ Next-Generation Firewalls (NGFW)
Applications
The applications area focuses on validating application integrity and enforcing
strict access controls using least privilege access with just-in-time and just-enough access
(JIT/JEA) to safeguard against attacks and ensure reliability
Implementation Strategies:
✓ Risk-Based Adaptive Policies for Access Controls
✓ Application Security Testing (AST)
✓ Application Firewalls
✓ Secure Development Lifecycle (SDL) Practices
✓ Container Security
Data
The data focuses on encrypting sensitive data both at rest & in transit to maintain
confidentiality and integrity, while implementing access controls and data classification to
minimize exposure to unauthorized users and potential breaches. Move from perimeter-based
data protection to data-driven protection. Use intelligence to classify and label data. Encrypt
and restrict access based on organizational policies.
Implementation Strategies:
✓ Data Encryption
✓ Data Loss Prevention (DLP)
✓ Data Classification
✓ Tokenization and Masking
Approach towards Zero Trust Framework
Zero Trust solution adheres to the NIST 800-207 standards. Rather than adopting a
separate access management solution, Zero Trust security is to be built into the network, not
just layered on top of it. Gartner, a global research and advisory firm, has termed this trend
"secure access service edge" (SASE).
Assessment:
Evaluate organization wide existing security measures, identify vulnerabilities, and assess the
organization’s readiness for Zero Trust adoption.
Define Attack Surface:
Catalogue which assets and resources will be subject to Zero Trust principles based on risk , ensuring
a focused approach.
Segmentation:
Segment not only Network but resources to minimize the blast radius of any successful attack by
defining granular resource boundaries and separating users according to roles and duties.
Adaptive Access Controls:
Define and enforce adaptive (based on context, including user identity, device, location, type of
content, and the application being requested) role based access controls along with principle of least
privilege and lifecycle management. user access privileges are continually reassessed as context
changes. Classify and manage data access according to risk.
Multi factor Authentication:
Implement multi-factor authentication and continuous authentication mechanisms to verify user
identities across all users and privilege accounts using SSO.
Keep devices & applications updated:
Vulnerabilities need to be patched as quickly as possible. Zero Trust networks should be able to
restrict access to vulnerable devices. It reduces the attack surface and risk of a data breach.
Real time Monitoring:
Deploy real-time monitoring tools to detect anomalies and respond promptly to threats. Use
analytics to get visibility, drive threat detection, and improve defenses. Rich intelligence and
analytics are utilized to detect and respond to anomalies in real time. Reduce security vulnerabilities
with expanded visibility across digital environment.
Automation and Orchestration:
Rapidly solve and iterate on security issues that occur as part of a zero trust practice with
orchestrated actions and common playbooks reducing cleanup time and cost.