Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

A Study on Zero Trust

Spencer Wan
University of Wollongong
Singapore

Abstract— Zero Trust is a strategic cybersecurity approach There must also be classification and considering of the
that revolutionizes traditional security models by eliminating sensitivity of the data being accessed. Access to higher
implicit trust and requiring continuous validation for every classification data should require more stringent verification
digital interaction. This paper explores the core principles of processes and be based on the principles of least privilege.
Zero Trust, some of their benefits and their implementation
strategies. B. Use Least Privilege Access
The principle of least privilege access aims to minimise
Keywords—Zero, Trust, Case, Study the potential damage of a security breach by restricting
I. INTRODUCTION access rights for users and applications to the bare minimum
necessary for their roles and functions. Key aspects of
Zero Trust is a strategic approach to cybersecurity that implementing least privilege access includes Role-based
secures an organisation by eliminating implicit trust and access controls and Just-in-Time access:
continuously validating every stage of a digital interaction.
1) Role-based access control:
In essence, it is the model of requiring strict identity This method assigning permissions based on the user's
verification for every person and device trying to access role within the organisation. Each role is assigned a set of
resources on a private network, regardless of whether they permissions that align with its responsibilities, ensuring that
are inside or outside the network perimeter. users can only access the information and resources
Unlike traditional security models that operate on the necessary for their job functions.
typical assumption that entities inside the network perimeter 2) Just-in-time access:
were inherently trustworthy, Zero Trust mandates This method grants temporary access rights to users for a
verification, and does not grant automatic trust, thereby specific task or period. Once the task is completed or the
abolishing any of the exemptions for specific people or time period expires, the access rights must be revoked. Either
devices. The goal is to minimise data breaches and limit manually for early task completion, or automatically once the
internal lateral movement by continuously verifying time expires. This approach ensures that elevated access
credentials and employing a principle of least privilege. permissions are granted only when absolutely necessary and
II. CORE PRINCIPLES for the shortest duration possible.
Zero Trust is built on three fundamental principles that C. Assume Breach
form the backbone of its strategic approach to cybersecurity: The principle of assuming breach shifts the mindset from
Verify Explicitly, Use Least Privilege Access, and Assume prevention to resilience, operating under the assumption that
Breach. Each of these principles ensures that security is security breaches are inevitable. This principle drives the
maintained at every step of a digital interaction, making it design of systems to contain and minimize the damage from
significantly more difficult for malicious actors to breaches. Key strategies include Micro-segmentation,
compromise systems and data. Continuous monitoring and analytics, Data encryption and
tokenisation, and a Robust incident response strategy.
A. Verify explicitly:
The Zero Trust model fundamentally rejects the 1) Micro-segmentation:
assumption that any entity, whether user, device, or This method involves dividing the network into isolated
application, can be trusted by default (NIST, 2020). segments or zones, each protected by its own security
Therefore, every access request must be authenticated and controls. This strategy limits the lateral movement of
authorised based on comprehensive, context-aware criteria attackers within the network, confining any breach to a single
before granting access. This approach requires considering segment.
multiple factors beyond just user credentials, such as User
2) Continuous monitoring and analytics:
identity, Device health and Data classification.
This method involve using advanced tools and techniques
1) User identity: to monitor network activities in real-time, detect anomalous
Before granting access, robust authentication methods, behaviour, and identify potential breaches quickly.
such as multi-factor authentication (MFA) should be
3) Data encryption and tokenisation:
prompted in any environment, outside or inside the network
This method involve securing sensitive data both at rest
to diligently ensure that the user is who they claim to be.
and in transit, ensuring that even if data is accessed by
2) Device health: unauthorized parties, it remains unreadable and unusable.
Evaluate the security posture of the device being used.
4) Robust incident response:
This includes checking for compliance with security policies,
This method involves establishing comprehensive plans
such as up-to-date antivirus software and operating system
and procedures to detect, respond to, and recover from
patches. This aims to ensure that devices brought in are
security incidents. This includes regular IR drills and
checked for vulnerabilities and to ensure their risks are
simulations to ensure the organization is prepared for real-
mitigated as much as possible.
world scenarios.
3) Data classification:
III. BENEFITS OF ZERO TRUST APPROACH C. Operational efficiency:
Since the Zero Trust model emphasises the principle of 1) Seamless Security
"never trust, always verify." (Buck, 2021). It focuses on By employing seamless authentication mechanisms, such
eliminating implicit trust and continuously validating every as single sign-on (SSO). For example, SSO reduces the need
stage of a digital interaction. Some of the key benefits of for users to remember multiple passwords, and also helps
implementing a Zero Trust architecture includes reduce the number of password resets. This balance of
enhancements to an organisation's overall security posture, security and convenience enhances productivity without
compliance and risk mitigation, operational efficiency, and compromising protection.
cost savings.
2) Remote Work Enablement
A. Enhanced security: In the era of increased remote work (Ozimek, 2020), the
1) Pro-active defence strategy: policy of Zero Trust can support secure remote access to
By incorporating the Zero Trust methodology of company resources since every access request, even within a
assuming breach, it stimulates the network by probing it and VPN, is authenticated and authorised. This provides an extra
also continuously monitoring for any anomalous behaviour. layer of security for remote connections.
Instead of waiting for something to happen, it is more D. Cost savings:
prudent to treat the network as if there was an attacker
already inside, thereby increasing the rate with which 1) Reduced operational costs:
defence systems can successfully respond to new attacks Having effective breach prevention and mitigation
(Colbaugh, 2021). reduces the time and resources needed to recover from
security incidents. This includes lower costs for incident
2) Reduced attack surface: response, system restoration, and data recovery. Furthermore,
Since every access request is authenticated and a centralised and automated security management reduces the
authorised, it mitigates the risk of credential theft, Man-in- need for manual intervention and oversight, leading to
the-Middle attacks, and insider threats. Furthermore, operational cost savings.
enforcing least privilege access by granting users and
applications only the minimum permissions necessary to 2) Demonstrable due diligence:
perform their roles, it minimises the number of potential In the event of a breach, since the organisation that can
entry points for attackers. Together, they significantly reduce demonstrate they have implemented robust security measures
the attack surface. like Zero Trust, it is more favourable to reduce potential fines
and legal fees.
3) Restricting attacker’s lateral movement:
As Zero Trust employs micro-segmentation, each a) Avoidance of penalties
segment, is protected by its own security controls. This By complying with data protection regulations such as
strategy limits the potential lateral movement of attackers GDPR or HIPAA, it mitigates the risk of regulatory actions
within the network, with the goal of containing a breach to a and associated legal costs as non-compliance can result in
single compartment – like a specified VLAN or Physical significant fines.
network. b) Reduced legal costs
B. Compliance and risk mitigation: As data breaches often lead to legal battles, including
1) Due diligence: lawsuits from affected parties and contractual disputes with
Zero Trust helps organisations comply with stringent partners. We decrease the likelihood of such breaches,
regulatory requirements such as GDPR or HIPAA, by thereby reducing the potential for costly legal proceedings.
enforcing strict access controls and protecting sensitive data IV. THOUGHTS ON ZERO TRUST APPROACH
through encryption and tokenisation. This standard legally
ensures that sensitive information is safeguarded. The In my view, the Zero Trust architecture approach to
detailed logging and monitoring integral to Zero Trust cybersecurity represents a paradigm shift from traditional
provide comprehensive records of access and activity. This security models that relied heavily on perimeter defences and
facilitates compliance audits and simplifies reporting, making implicit trust for internal network activities. It is the war
it easier for organisations to demonstrate adherence to forward to proactively adapt to the changing security risks in
regulatory requirements. With these practices, it can be today's complex digital environments. By implementing
shown due diligence is being rigorously followed, leaving no granular access controls, continuous monitoring, and strong
room for doubt about compliance and data protection efforts. authentication mechanisms, organizations can better protect
their assets and data from potential breaches and insider
2) Risk mitigation: threats.
a) Operational readiness However, some challenges remain; in an ideal world,
Operating under the assumption that breaches are with unlimited resources and money, a full Zero Trust model
inevitable, Zero Trust enables organisations to design would be a highly secure working environment that should
systems that quickly identify, contain, and mitigate the also seamlessly allow work to function without hassle. It
impact of security incidents thereby enhancing the ability to would also check every single nook and cranny, in this case,
manage and recover from breaches to maintain operational every device, asset, software or people.
capabilities.
Change management is an important factor in deploying
b) Data protection Zero Trust. There needs to be a buy-in from all stakeholders
Since sensitive data should be encrypted both at rest and and decisionmakers, to ensure that Policies and Procedures
in transit, it remains unreadable and unusable. Tokenised will be followed through. To add on, there also remains the
data further protects sensitive information by replacing it difficulty of linking and integrating it with existing systems.
with non-sensitive tokens.
It is time consuming to detail down what can function also increase the likelihood of Shadow IT being used to
together with what already exists. circumvent these restrictions.
Hence, the upfront cost of investing into Zero Trust With these in mind, user education and awareness are
technologies and solutions can be a substantial hurdle for essential components of achieving a balance between
organisations. Budget must also be allocated to these new security and usability. Employees need to understand the
tools, hiring new staff to utilise and to train for existing staff, importance of Zero Trust security measures and how to
and the management of the new resources. navigate them effectively. Of course, to balance the two, we
could leverage on the Russian proverb “Trust, but Verify”. In
Fundamentally, there needs to be a Security Operations
my view, it is going to be infeasible to verify all assets every
Centre (SOC) to perform the task of Continuous Monitoring
single time they request access, a balance could be that some
as Zero Trust requires constant vigilance and real-time
things could be trusted, if the risk analysis shows to be
monitoring to be effective. Ideally an in-house SOC would
extremely low, but you should occasionally verify them.
be preferred, as the organisation would have full control and
(Burgess, 2023)
visibility. But outsourced SOCs should not be discounted as
well if budget is tight. In the end, these factors vary from place to place, and
organisations must take them into account before, during and
With these in mind, there are two big challenges I see in
after the deployment of Zero Trust architecture. Finding the
Zero Trust – Cost, and the balance of security and
right balance can be a tricky thing, but Zero Trust will be the
accessibility.
way forward in cyberspace.
A. Cost:
REFERENCES
The most critical consideration is cost. The cost
[1] Stafford, V. A. (2020). Zero trust architecture. NIST special
challenges associated with Zero Trust requires careful publication, 800, 207.
planning, budgeting, and prioritisation. Organisations should [2] Buck, C., Olenberger, C., Schweizer, A., Völter, F., & Eymann, T.
conduct a thorough cost-benefit analysis to assess the (2021). Never trust, always verify: A multivocal literature review on
potential return on investment (ROI) of implementing Zero current knowledge and research gaps of zero-trust. Computers &
Trust measures and prioritise investments based on their Security, 110, 102436.
unique security requirements, risk profile, and available [3] Colbaugh, R., & Glass, K. (2011, July). Proactive defense for
resources. evolving cyber threats. In Proceedings of 2011 IEEE International
Conference on Intelligence and Security Informatics (pp. 125-130).
B. Balance between security and accessibility: IEEE.
[4] Ozimek, A. (2020). The future of remote work. Available at SSRN
Next, is the consideration of convenience. It is human 3638597.
nature to take the shortest path to our destination – and it is [5] Burgess, C. (2023, July 24). The old “trust but verify” adage should
the same challenge cyber security. Too many restrictions, be the motto for every CISO. CSO Online.
strict access controls, frequent authentication prompts, and https://www.csoonline.com/article/646698/the-old-trust-but-verify-
other security measures can introduce friction and adage-should-be-the-motto-for-every-ciso.html
complexity into user workflows, potentially hindering
productivity, and user satisfaction. Potentially, this might

You might also like