Accelerate Your Zero Trust Journey
Accelerate Your Zero Trust Journey
This eBook is for IT professionals and leaders who are deploying a Zero Trust security
model. It covers foundational concepts like guiding principles for Zero Trust architectures,
top use cases to get started, and AWS solutions to help accelerate your journey.
Table of contents
Introduction. . ............................... .............................................................. 3
Conclusion.. . . . ............................................................................................ 14
2
I N T R O D U C T IO N
Zero Trust’s ongoing evolution has led to a variety of implementations and differing
guidance on the best way to roll out this security model across an organization, which
has delayed organizations from implementing and reaping the rewards of a Zero Trust
strategy. Amazon Web Services (AWS) is here to help accelerate your journey to a
Zero Trust security model.
3
W H AT IS ZE R O T R U ST ?
Zero Trust is a security model and associated set of mechanisms that focus on providing
security controls that don’t solely or fundamentally rely on traditional network controls
or perimeters. Put another way, Zero Trust is a security model where access to data and
applications is continually assessed and can be further restricted based on factors like who
is requesting access to what data using which device and from where. Zero Trust centers on
informing intelligent access decisions and enforcing them where they make the most sense
for your users and IT teams.
Authorization is key
In a Zero Trust architecture, you have the critical ability to make fine-grained authorization
decisions centrally across identity, device, data, and other contextual risk factors. In addition,
Zero Trust allows your IT teams to enforce granular, continuous, and adaptive policy-based
access control decisions at logical points across your network.
4
One of the tentpoles of Zero Trust is the idea that when two components do not need to
communicate, they should not be able to—even when they reside within the same network
segment. Your IT teams can accomplish this by authorizing specific flows between the
components, eliminating unnecessary communication pathways, and applying least-privilege
principles that better protect critical data.
Zero Trust architectures go beyond simply establishing networking and identity-based controls
that work side by side. In a Zero Trust model, network and identity systems are aware of one
another, allowing them to work in concert. This helps your IT teams be more exact with access
policies and more flexible in where they enforce authorization decisions.
Amazon Virtual Private Cloud (Amazon VPC) endpoints offer a prime example, as they provide
private network connectivity to AWS services and allow your IT teams to specify access control
policies. These policies and their associated enforcement engine understand the network and the
identities accessing it.
It is important not to characterize Zero Trust as an effort to meet a checklist of best practices.
Instead, a Zero Trust architecture will help your organization realize powerful business and
technical benefits—such as stronger protection for your most precious assets, increased
productivity, and improved customer trust due to fewer security events. AWS has developed a
set of principles that can help guide your way toward unlocking the benefits of Zero Trust.
5
A W S G UIDI N G P R I N CIP LES
Here are three guiding principles AWS has developed to help you navigate your journey to Zero Trust.
1 2 3
Where possible, use identity Work backwards from your specific Apply Zero Trust to your systems and
and network capabilities in tandem use cases data according to business value
While a Zero Trust security model decreases One of the best ways to pursue Zero Trust is Zero Trust concepts should be seen as additive
reliance on network location, the role of network to prioritize the use cases that will provide the to your existing security controls. By applying
controls and perimeters remains important to most benefits to your organization—and then Zero Trust based on the value of systems and
the overall security architecture. In other words, work backwards to determine the optimal Zero the sensitivity of data, you can check that the
the best security does not come from making Trust patterns, tools, and approaches to achieve benefits to your business are commensurate with
a binary choice between identity-centric and meaningful security advancements. Read on to your effort. As you continue on your journey to
network-centric tools but rather by establishing learn more about today’s top Zero Trust use cases. Zero Trust, your security posture will improve,
an architecture where these tools are aware of with your security controls benefiting from the
and augment each other. increased visibility and software-defined nature
of the cloud.
6
G E T T I N G STA R T E D
It may be wise to have your Zero Trust team move one of its own applications or application
groupings first. This can give other teams confidence in your capabilities when it is time to
move the components that are important to them.
7
3. Develop living reference architectures
Develop dynamic reference architectures that depict your objectives for each use case—and act
as living artifacts that are designed to evolve continually. These will allow you to start building
quickly and adapt as your efforts progress. Plus, using dynamic reference architectures early
in your Zero Trust journey will encourage teams to consider templatizing the architectures for
consumption over time.
8
Expanding your journey
As your Zero Trust team gains experience and more users enjoy the security
model’s benefits, your rollout will gain momentum. You will also begin to see
fewer security events, leaving you more time to focus on improving security
and the end-user experience—and generating enthusiasm that further fuels
adoption. Over time, a flywheel effect can take hold, where your Zero Trust
rollout can then accelerate and expand on its own.
It all starts with finding the Zero Trust use cases that provide you with the
most value. In the next sections, we will examine three top use cases for
today’s organizations.
9
T H R E E T O P U SE C A SES
10
T H R E E T O P U SE C A SES
Software-to-software
communications “[Securely] connecting applications to
data sources across multiple accounts
Modern architectures include software components that are constantly communicating with
was extremely difficult and time
other applications, data sources, and cloud-based application programming interfaces (APIs).
By eliminating unnecessary communication pathways to data, you can strengthen your consuming for us…[Amazon] VPC Lattice
security posture. enabled our developers to easily and
securely connect our applications and
A Zero Trust architecture can secure software-to-software communications from end to end
and free your developers to focus on innovation instead of security. You can accomplish this by data sources across accounts without
authorizing specific flows between software components and maintaining tight control over introducing network complexity.”
what and how components within your application network are able to communicate.
Suman Sriram, DevOps Team Lead, Altus Group
With AWS, this can be done by using application networking services to help connect and
secure your applications, implementing request-level evaluation, and applying least-privilege
permissions to better protect critical data.
For simplified application-level connectivity across virtual private clouds (VPCs), accounts, and a
mix of compute types, you should use Amazon VPC Lattice—an application networking service
that consistently connects, monitors, and secures communications between your components.
Amazon VPC Lattice raises your security posture by creating a dedicated application layer
network for software-to-software connectivity with embedded authentication and authorization.
This removes unregulated communication paths between software components, allowing your
developers to focus on application logic and deliver applications faster.
11
T H R E E T O P U SE C A SES
Authorization in your
custom applications
Today, your end users can authenticate to your custom applications with SAML-based third-party
IdPs using AWS Verified Access integration with AWS IAM Identity Center. If you already have a
custom IdP solution that is OpenID Connect compatible, AWS Verified Access can authenticate
users by directly connecting with your IdP.
However, the authorization logic may still be implemented in your custom application itself. Over
time, the code and permissions can grow increasingly complex to develop and maintain. And,
as more custom applications are built, handling authorization in this way can cause needless
duplication of effort and fragmentation.
On AWS, your developers can efficiently implement fine-grained access controls in applications
by using Amazon Verified Permissions. This scalable, performant, and fully managed service
externalizes authorization from applications and allows you to centralize the definition and
management of access policies. By moving authorization logic out of your application code,
you can provide developers with a consistent, scalable way to authorize user actions within and
across custom applications. And, your developers can align application access controls with Zero
Trust principles like least privilege and continual authorization for the resources and data within
their applications.
Both AWS Verified Access and Amazon Verified Permissions use the Cedar policy language.
Cedar is an expressive and analyzable open-source policy language that allows developers and
admins to define policy-based access controls using roles and attributes for more granular,
context-aware access control. This allows for better analysis and auditability of who has access to
which applications and to what resources within applications.
12
A W S SE R V ICES
13
C O N C L U SIO N
Next steps
Zero Trust architectures offer much more than improved security. They can reduce operational
burden on your business and technical teams, allowing them to move faster and with greater
agility, make smarter and more confident decisions, and be more productive.
With greater flexibility and less time spent worrying about security, your teams can focus
more on delivering great results for your customers and your business. In this way, Zero Trust
can even spark innovation—providing your teams with the peace of mind and courage to
experiment, explore, and ultimately bring bigger, bolder ideas to life.
At AWS, we embraced Zero Trust early, incorporating its principles into the design of our
infrastructure to help meet the needs of the most security-conscious organizations in the
world. Today, our breadth of security, identity, application development, and networking
services delivers the building blocks of Zero Trust as standard features that you can apply
to new and existing workloads. Plus, AWS offers guidance that can help you realize the full
benefits of Zero Trust along every step of your journey.
Following the guidance in this eBook can help you lay the foundation for Zero Trust success—
and ultimately transform your organization into a secure, flexible enterprise that’s built for
today and ready for tomorrow.
© 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved.
14