{"id":159194,"date":"2021-06-25T06:00:00","date_gmt":"2021-06-25T11:00:00","guid":{"rendered":"https:\/\/www.ict-pulse.com\/?p=159194"},"modified":"2021-06-24T17:55:20","modified_gmt":"2021-06-24T22:55:20","slug":"zero-trust-security-what-it-is-and-why-msmes-should-take-it-seriously","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2021\/06\/zero-trust-security-what-it-is-and-why-msmes-should-take-it-seriously\/","title":{"rendered":"Zero trust security: what it is, and why MSMEs should take it seriously"},"content":{"rendered":"\n

Zero trust is an approach to cybersecurity that is garnering a lot of attention, as more organisations move to implement it. Although transitioning to a zero trust model is a massive undertaking, it is likely to influence how all businesses and organisations think about security.<\/em><\/p>\n\n\n\n

 <\/p>\n\n\n\n

If there was any single, common theme that emerged from last week\u2019s roundup of Caribbean ICT\/tech news (for the week ending 20 June 2021)<\/a> is cybercrime and cybersecurity. There were many reports about increases in cybercrime in the region, and the concern that countries are not as prepared as they should be.<\/p>\n\n\n\n

To be fair, there has been a growing awareness of the importance of security in the Caribbean region; but businesses, and even governments, might be challenged to provide the resources needed to effectively maintain the security of their networks and systems. To a considerable degree, security is becoming a fulltime job \u2013 both literally and figuratively. IT or security personnel are charged with continually monitoring, testing, upgrading, and maintaining the security of the networks under their care, whilst also keeping up to date on the latest trends and developments, and trying to ensure that network users are exercising the requisite care.<\/p>\n\n\n\n

As much as more organisations have been focussing on cybersecurity, there are no guarantees, even with the best effort, that one\u2019s organisations will not be successfully breached. However, there have been concerns that the typical approach to security might be too weak in light of the scale and sophistication of the threats we have been experiencing. Organisations, particularly enterprises appear to be moving towards a \u2018zero trust model\u2019 or \u2018zero trust architecture, which although created over a decade ago, only now seems to be becoming more mainstream.<\/p>\n\n\n\n

In this article, we give a brief primer on zero trust security, and conclude by sharing some views on why this approach to security ought to be taken seriously.<\/p>\n\n\n\n

 <\/p>\n\n\n\n

Zero trust security: what is it?<\/h2>\n\n\n\n

Traditionally, network security was conceptualised to \u2018keep out the bad guys\u2019, i.e. \u2018perimeter security\u2019, through the use of firewalls, passwords and other forms of access controls, virtual private networks, to name a few. Consequently, and as a default, the users inside the network were trusted, and those who provide the required access credentials were granted access \u2013 similar to a castle with a drawbridge.<\/p>\n\n\n\n

Zero trust security goes by many names, including \u2018perimeterless security\u2019, and its premise turns perimeter security on its head. Essentially, no user or device is implicitly trusted, or trusted by default \u2013 even if they are (or remain) connected to a managed corporate network. Zero trust security assumes that the network has been compromised, and so continually requires users and devices to prove that they are not attackers.<\/p>\n\n\n\n

Although the concept of zero trust might initially have been adopted for remote and cloud-based users and assets, when entities would have needed to connect to their organisation\u2019s corporate network via the internet, for example, it now encompasses all elements and assets on the network, regardless of location. In other words, even if a user, device, asset, etc., are located within an organisation\u2019s own network boundary, and even if is connected directly to the corporate network, that resource is not automatically trusted.<\/p>\n\n\n\n

In summary, the United States of America National Institute of Standards and Technology<\/a> has established the following seven core principles for zero trust architecture:<\/p>\n\n\n\n

  1. All data sources and computing services are considered resources.<\/li>
  2. All communication is secured regardless of network location.<\/li>
  3. Access to individual enterprise resources is granted on a per-session basis.<\/li>
  4. Access to resources is determined by dynamic policy\u2014including the observable state of client identity, application, and the requesting asset\u2014and may include other behavioural attributes.<\/li>
  5. The enterprise ensures that all owned and associated devices are in the most secure state possible and monitors assets to ensure that they remain in the most secure state possible.<\/li>
  6. All resource authentication and authorization are dynamic and strictly enforced before access is allowed.<\/li>
  7. The enterprise collects as much information as possible about the current state of network infrastructure and communications and uses it to improve its security posture.<\/li><\/ol>\n\n\n\n

     <\/p>\n\n\n\n

    Zero trust security:  pros<\/h2>\n\n\n\n

    Although adoption of a zero trust security approach would effectively result in a paradigm shift from the standard perimeter security approach, it offers a number of benefits, including the following:<\/p>\n\n\n\n

    First<\/strong>, it offers a more unified and cohesive approach to security, since for all intents and purposes, all resources are treated the same, regardless of their location. It can thus offers a more streamlined model or architecture, which in turn can facilitate an optimised approach to IT\/security management.<\/p>\n\n\n\n

    Second<\/strong>, it strengthens the overall security of a network, as all users\/resources must not only prove they are not attackers before access is granted, but also that access is not indefinite or unbounded. On a per-session basis, just-enough access should be given just-in-time.<\/p>\n\n\n\n

    Third<\/strong>, due to the heightened vigilance and the frequent verifications that zero trust networks must conduct, they are better able to detect a broad range of incidents that potentially could lead to intrusions, for example, stolen passwords and access credentials, or access to a privileged workstation.  <\/p>\n\n\n\n

     <\/p>\n\n\n\n

    Zero trust security:  cons<\/h2>\n\n\n\n

    As previously stated, implementation of a zero trust security approach could require an organisation to overhaul its approach to security, which depending on the size and complexity of the organisation, could be a mammoth undertaking. However, there are also other challenges with zero trust security that ought to be considered, such as the following:<\/p>\n\n\n\n

    First<\/strong>, a key premise of zero trust security is to limit user access with just-in-time and just-enough-access. However, not all applications and tools can be configured to accommodate tiers of privileges \u2013 in order to provide users with just-enough access, i.e. the lowest privilege they need. It can thus result in configuration challenges, which inherently can affect the extent to which zero trust can be successfully implemented.<\/p>\n\n\n\n

    Second<\/strong>, and although zero trust offers enhanced security and can minimise the threat that can result from stolen credentials and from malicious insiders, it cannot eliminate them completely. Hence if an insider misuses his\/her access privileges, or an attacker gets a hold of a legitimate user\u2019s credentials, the security of an organisation\u2019s network could be compromised.<\/p>\n\n\n\n

    Third<\/strong>, in the zero trust model, a policy administrator and policy engine approves all connections between network resources. It thus mean that the policy administrator and policy engine need to be properly configured and maintained, and potentially could be points of vulnerability for zero trust networks. Possible threat scenarios include unauthorised access to the policy engine, or if an administrator makes mistakes in configuring the policy engine.<\/p>\n\n\n\n

     <\/p>\n\n\n\n

    Zero trust security:  why it should be taken seriously<\/h2>\n\n\n\n

    As is evident in much of the discourse on zero trust security, it has been developed with enterprises in mind. Transitioning to the zero trust approach is not a trivial matter. It requires manpower, expertise, lots of money, and may take years to fully complete; and so is likely to be beyond the reach of micro, small and medium enterprises in particular.<\/p>\n\n\n\n

    However, the importance of the zero trust concept to all businesses and organisations \u2013 regardless of size \u2013 is the fact that it has challenged the traditional approach to security. It requires a fundamental re-think of how security can and should be implemented, especially when the complexity of today\u2019s networks, the broad range of demands that are being placed of network resources, and the flexibility with which users still need to be able to access networks, are all considered. Further, and perhaps more importantly, cyberattacks have increased in volume and sophistication; which in turn demands that our approach to security also evolve.<\/p>\n\n\n\n

     <\/p>\n\n\n\n

     <\/p>\n\n\n\n

    Image credit: rsch60 (Pixabay<\/a>)<\/em><\/p>\n\n\n\n

     <\/p>\n","protected":false},"excerpt":{"rendered":"

    Zero trust is an approach to cybersecurity that is garnering a lot of attention, as more organisations move to implement it. Although transitioning to a zero trust model is a massive undertaking, it is likely to influence how all businesses and organisations think about security.<\/p>\n","protected":false},"author":2,"featured_media":159195,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[11],"tags":[105,39,262,316],"class_list":["post-159194","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ict-tech","tag-cybercrimecybersecurity","tag-equipment-security","tag-it-security","tag-network-security","et-has-post-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/ict-pulse.com\/wp-content\/uploads\/2021\/06\/Sweden-River-Drawbridge-Landscape-Mirroring-Water-rsch60-Pixabay-.jpg?fit=1052%2C657&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-FpE","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/159194","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=159194"}],"version-history":[{"count":2,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/159194\/revisions"}],"predecessor-version":[{"id":159197,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/159194\/revisions\/159197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media\/159195"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=159194"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=159194"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=159194"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}