4 minute read

The Importance of Zero Trust

THE IMPORTANCE OF ZERO TRUST Why you need dynamic user and device authentication

Ancient tactic, modern threat. Assume the arrow is already over the wall. By Scott Nursten, CEO, ITHQ

Centuries ago, armies might fi re letters attached to arrows over the wall into a besieged city, promising a reward to anyone who opened the gates. In 2020, a Tesla employee was contacted by a Russian cybercriminal, promising to pay $1 million if they helped infect the company’s system with malware. (Luckily for Tesla, this employee blew the whistle.)

The point is, an ancient tactic was used in a modern setting, highlighting the vulnerability still posed by insiders. Combatting this threat means applying the tenets of Zero Trust, based around the presumption that you’ve already been breached. If the enemy is already inside your defences, your firewall is useless. If they are disguised as someone with all areas access, how will you catch them out? The answer now is to create policy decisions and enforcement points across your networks. In other words, replace trust zones with Zero Trust: controlled, conditional, dynamic access in multiple places.

Your staff are trustworthy. Hackers pretending to be your staff are not Zero Trust has garnered negative reactions because people infer a lack of trust in their staff. Let’s be clear: this is not about mistrusting individuals in your building. This is about verifying that every user and device on your network is the person and device you expect it to be.

Just because a person is logged in as ‘Sam’ doesn't mean it is really them. Without multifactor authentication, biometrics and additional checks, we can't determine authenticity of user or device. Standard access to your cloud-based environments and SaaS platforms, is usually via a username and password, maybe an MFA token: all of which are possible to hack. IP addresses too are no longer suitable as trusted identifi ers. The only way to authenticate reliably is at user and device level every time access is requested. Hence, the rise of Zero Trust.

THE OLD TRUST ZONES ARE GONE

Zero Trust is a new form of security architecture which has replaced the old ‘trust zones’ network design. As a rule, the more exclusive the access to a zone, the higher the trust. A general low-trust zone carried few access requirements. A private zone with more stringent access requirements carried higher trust, while your fi nancial zone, for example, would be accessible to only a few people and would therefore be your highest trust zone.

Trust implications might mean data wasn’t encrypted inside the highest trust zone, or that location alone would act as proof that only the right users were in there.

With more attacks exploiting the trusted user, their laptop or phone, you can no longer trust authenticity of identity based on access level alone.

❛❛ Just because a person is logged in as ‘Sam’ doesn't mean it is really them. Without multifactor authentication, biometrics and additional checks, we can't determine authenticity of user or device ❜❜

THE FOUR TENETS OF ZERO TRUST

n Always assume a hostile environment Assume that all devices, user accounts and any other resource could be used against you. The imperative is to have clear policy enforcement and decision points requesting regular verifi cation.

n Never trust, always verify It looks as though Sam is using Sam’s laptop, but how do you know for sure? Verify the user and their device using a variety of factors.

n Always presume a breach Behave as if the adversary has already breached your wall. Penetration testing and fi rewall scanning will do nothing if you are locked inside with your adversary. Everyone must verify who they are across every area of your network, regardless of access level.

n Scrutinise explicitly Your controlled access must also be dynamic and conditional. Dynamic variables give administrators the ability to grant or deny access to network resources. Conditional access is policy-driven and usually works on the basis that if a user requests access, then they must complete an action. Include behavioural observation wherever possible. For instance, a ‘user’ might have a username, password and MFA token but be trying to access your network from China or trying to access restricted areas. Any unusual behaviour should automatically fi re out additional verifi cation requests.

LOG EVERYTHING

Cybercriminals remove all trace of their activities to prevent them being caught for their crimes. They destroy access attempts immediately after successful infiltration: the cyber equivalent of wiping down every surface to remove their fingerprints. If you log data in off-site, immutable stores and analyse it at machine speed you know what is always happening across your environment, catching bad actors in the act and identifying vulnerable user accounts. Their access then leaves indelible traces that can be used as evidence.

QUESTIONS FOR IT

n How do we verify our users and devices? n How often do we request authentication? n Can you show me evidence of how we do this? n Can you show me all our access logs?

It should be obvious to all users, including business leaders, that zero trust verification exists across the organisation. If you can get straight onto your network with just a username and password, or once on there, you can access even your most sensitive data, alarm bells should be ringing.

Don’t make the mistake of choosing ease of access over security. If you can access everything on the network easily, so can a hacker.

For more information, feel free to get in touch with me at transform@ithq.pro www.ithq.pro

}}NEXT MONTH’S TOPIC

TIPS FOR BETTER CYBER RISK MANAGEMENT

This article is from: