Zero Trust is an approach to cybersecurity, not a product or even a specific architecture. The core principle of this approach is not to trust any user or asset on your network and work on the assumption that “an enterprise-owned environment is no different — or no more trustworthy — than any non-enterprise-owned environment” (from the 2020 NIST Special Publication 800-207 “Zero Trust Architecture”).
The concept of Zero Trust carries significant implications. Philosophically, it shifts from assuming trust in employees and assets to treating none as inherently trustworthy. Continuous evaluation and verification of trust on a transactional basis become vital, ensuring only authorized entities access data and assets. Organizations must transform their architecture, culture, and cybersecurity mindset. Network-wise, the defensive perimeter relocates from network edges to internal assets. Yet, many maintain perimeter defenses while bolstering security with internal controls, like network and host-based measures, close to data. This "defense in depth" principle, though not new, remains crucial for transitioning to a Zero Trust security approach.
Zero Trust is a journey, not a destination. The journey consists of both technical and cultural shifts, oftentimes enforced by executive mandate. While cultural aspects are harder to implement, they’re crucial for success as it’s now widely accepted that user training, behavior, and buy-in are critical to Zero Trust's success. There are now several roadmaps or models that have been developed for Zero Trust by standard bodies and technology vendors. Figure 1 illustrates a typical representation of a Zero Trust model.
One of the key things these models have in common is the need for visibility. This is shown as one of the foundation layers in this model. Visibility is critical to Zero Trust because, to close this section with another cliché, you can’t protect what you can’t see. This is why visibility and analytics are built in as one of the foundational layers of the CISA Zero Trust model.
Figure 1. CISA Zero Trust Model as defined in the April 2023 Cybersecurity and Infrastructure Security Agency publication Zero Trust Maturity Model.
Although Zero Trust models often show multiple pillars and foundational layers, at its core, Zero Trust is based on three key principles: Adopt a breach mentality, never trust, and continuously verify. These principles assume that organizations have full visibility of all the hardware and software assets, applications and data assets, users, and devices on their networks. This visibility enables these Zero Trust principles to be effectively implemented.
With the rising sophistication of cyberattacks, organizations adopting a Zero Trust architecture must operate under the assumption of repeated breaches. Swift and accurate breach identification is crucial. Further, the architecture should have controls, such as segmentation, that can limit the impact of these attacks, often called “the blast radius.” This is achieved by developing a defense-in-depth security posture at all levels of the network.
This is the most easily understood of the Zero Trust principles but one of the hardest to put into practice since most systems within an organization have been traditionally built around an implicit trust model that assumed the trustworthiness of users, devices, and controls.
Despite the conflict between the Zero Trust philosophy of complete distrust and the trust culture nurtured by organizations over decades, it’s imperative to keep Zero Trust. Evidence indicates that a substantial number (of over 40 percent) of breaches are caused by employees or contractors acting in bad faith or human error.
The traditional trust model assumes stability, disregarding inevitable changes in behavior and technology. Zero Trust counters this by requiring constant verification of all network entities against defined security policies. For example, attackers get smarter, employees get careless, login credentials become compromised and so on. A key component of a Zero Trust network is a policy engine that has full visibility into all network activity and continuously verifies and enforces activities against these policies.
Some of the main benefits include:
To achieve these benefits, 148 organizations surveyed in Q1 2023 identified the following Zero Trust use cases as their top priorities:
Figure 2. Results of the Pulse Survey “Approaches to Visibility in a Zero Trust” (2023), conducted by Gatepoint Research.
Whatever the expected benefits and priority use cases driving to a Zero Trust architecture, organizations must map out a clear and realistic strategy for their migration to Zero Trust. Gigamon, the industry leader in deep observability, has worked with thought-leader John Kindervag, formerly of Forrester Research and the man who originally coined the term “Zero Trust,” to develop a whitepaper that discusses:
“Gaining complete visibility into the network is like lighting up the whole street. When it comes to implementing Zero Trust, this is the best place to start.”
Unless mandated by executive order or regulation, you should choose the ZTA model that best suits your organizational goals. One such model is that proposed by John Kindervag, who has defined the five steps necessary to build a Zero Trust network, which can be summarized as follows:
The Gigamon Deep Observability Pipeline provides visibility into all data in motion on the network, and, as identified in this blog, this is critical for implementing and continuously verifying a Zero Trust network.
Gigamon has extensive experience working with our customers to implement Zero Trust networks, especially within the federal government.
To learn more about how Gigamon can help you build a Zero Trust network, visit the Zero Trust page of our website, or download the John Kindervag whitepaper.
“The Gigamon platform enables us to feed all the different tool sets we have acquired and offers us X-ray capability, not only in the physical world but also in the virtual world.”