You are on page 1of 16

E-guide

Implementing a Zero-
Trust Approach to
Network Security
E-guide

In this e-guide
The growing number of users with legitimate reasons to access
Zero-Trust Security Means
network resources, coupled with the increasing deprecation of
New Thinking Plus Practical the perimeter means designating users as being internal or
Steps p.2 external is becoming meaningless.

Microsegmentation Security: Using a zero-trust approach to network security means there is


Your Key to Zero Trust p.6 no need to differentiate between the two types of threat; every
potential threat is treated in the same way.
Key Steps to Put Your Zero-
Trust Security Plan Into Action
However, implementing zero trust requires creating detailed
pppppppppppppppppppp p.11
policies and devising certain "hoops" which those wanting
About SearchSecurity p.15
access to critical infrastructure must jump through.

In this e-guide, explore:

• A comprehensive explanation of what zero trust means


(Hint: its more than a policy of trusting nothing and no
one)
• The concrete benefits of a zero-trust security policy
• The practical steps to take when implementing zero trust
• And more

Page 1 of 15
E-guide

In this e-guide
Zero-trust security means new thinking
Zero-Trust Security Means plus practical steps
New Thinking Plus Practical
Steps p.2 Johna Johnson, President and Senior Founding Partner at Nemertes Research

Microsegmentation Security:
By now, you've probably heard about zero-trust security, but you may be
Your Key to Zero Trust p.6 unsure how to implement it. Part of the problem is the name. Zero-trust
sounds good, but putting the concept of never trust anything ever into
practice is literally impossible. If users never trust any system, user, device,
Key Steps to Put Your Zero-
Trust Security Plan Into Action application or process, the enterprise would be unable to function.
pppppppppppppppppppp p.11
A more accurate -- if clunkier -- name would be highly granular and
distributed trust. That is, the concept behind zero trust is actually highly
About SearchSecurity p.15
granular control of distributed trust. A session of type X between devices Y
and Z may be permitted, but not all sessions of type X or all sessions of any
type between devices Y and Z should be trusted.

Those twin concepts -- highly granular and distributed trust -- form the twin
lynchpins of zero-trust security. Zero trust relies on -- and demands -- a
deep knowledge of systems and data so IT can put meaningful boundaries
around systems, processes, applications and users everywhere.

Page 2 of 15
E-guide

Zero-trust security, therefore, requires IT to radically rethink networks,


In this e-guide including the roles -- and even the existence -- of conventional and separate
routers, firewalls, distributed denial-of-service defenses, network
Zero-Trust Security Means segmentation products, and all the other familiar network elements. Security
New Thinking Plus Practical
functions, which are increasingly virtualized and modularized as virtual
Steps p.2
appliances and virtualized network functions, can be implemented
throughout the infrastructure as needed.
Microsegmentation Security:
Your Key to Zero Trust p.6 Zero trust also places security automation at the heart of security
operations and brings with it all the benefits of automation: reliability, agility
Key Steps to Put Your Zero- and scalability.
Trust Security Plan Into Action
pppppppppppppppppppp p.11
Zero-trust practicalities
About SearchSecurity p.15
How should cybersecurity practitioners take all these concepts -- using
highly granular and distributed trust, rethinking network design,
implementing automation -- and turn them into practical steps?

The first place to start is virtualization. Computing and application


virtualization are relatively mature. Most organizations have moved toward
virtualized servers, and many have implemented a microservices- and
container-based software development paradigm. So implementing zero
trust at the computing and application layer starts with trying to provide

Page 3 of 15
E-guide

granular, distributed security to these virtual machines (VMs), microservices


In this e-guide and containers.

Zero-Trust Security Means Tools from vendors such as Aqua Security, Capsule8, Layered Insight,
New Thinking Plus Practical NeuVector, StackRox, Tenable and Twistlock can provide container-based
Steps p.2 security. Tools like JSON Web Tokens can assist with microservices
security.
Microsegmentation Security:
Your Key to Zero Trust p.6 Networking infrastructure, however, is significantly less mature. Many
organizations still construct networks via a portfolio of physical devices --
switches, routers, firewalls, load balancers, gateways, etc.
Key Steps to Put Your Zero-
Trust Security Plan Into Action
A critical step when implementing zero-trust security within a network
pppppppppppppppppppp p.11
infrastructure is the move to virtualization. Implementing software-defined
networking in the data center and SD-WAN in the WAN provides the
About SearchSecurity p.15
necessary platform to instantiate network and network security functions as
VMs rather than physical devices. A firewall, for instance, might become a
firewall VM in a branch-in-a-box SD-WAN device. This, in turn, enables
automated and granular control of the functionality.

Page 4 of 15
E-guide

In this e-guide
Getting to zero
Zero-Trust Security Means Traditional security and networking vendors like Cisco, Checkpoint, Juniper
New Thinking Plus Practical Networks, Fortinet and Palo Alto Networks and emerging providers like 128
Steps p.2
Technology are offering these types of virtualized products that provide
granular control over individual sessions, along with dynamic reconfiguration
Microsegmentation Security: of permissions. It's worth revisiting both the traditional and emerging players
Your Key to Zero Trust p.6
to assess their degree of virtualization.

Key Steps to Put Your Zero- It's also important to think about centralized policy when choosing a tool.
Trust Security Plan Into Action Some vendors are beginning to make a play toward becoming the network
pppppppppppppppppppp p.11 policy engine, providing hooks into a range of partner technologies that can
implement the centralized policy. Regardless of which vendor you wish to
About SearchSecurity p.15 anoint as the policy engine, it's critical to think in terms of having a
centralized policy repository from which you can make changes that ripple
out to the entire infrastructure.

The bottom line? Even though zero-trust security isn't what its name implies,
it will ultimately change everything. And, when implementing it, network
infrastructure is the weakest link, so pay special attention to virtualizing and
securing your network infrastructure.

Next Article

Page 5 of 15
E-guide

In this e-guide
Microsegmentation security: Your key to
Zero-Trust Security Means zero trust
New Thinking Plus Practical
Steps p.2 Dave Shackleford, Principal Consultant at Voodoo Security

Microsegmentation Security:
There are many tools and controls available that can help monitor internal
Your Key to Zero Trust p.6 workloads and data moving between hybrid cloud environments. But above
all, enterprises need to adopt one overarching theme when designing a
dynamic security architecture model: zero trust.
Key Steps to Put Your Zero-
Trust Security Plan Into Action
In order to implement a zero-trust model, security and operations teams will
pppppppppppppppppppp p.11
need to focus on two key concepts. First, security will need to be integrated
into the workloads themselves, and will move with the instances and data as
About SearchSecurity p.15
they migrate between internal and public cloud environments. Second, the
actual behavior of the applications and services running on each system will
need to be much better understood, and the relationships between systems
and applications will need more intense scrutiny than ever to facilitate a
highly restricted, zero-trust operations model.

Page 6 of 15
E-guide

In this e-guide
Automating zero trust microsegmentation security
Zero-Trust Security Means As hybrid cloud architectures become the new norm, many organizations
New Thinking Plus Practical are focusing heavily on automation, far beyond what we've traditionally seen
Steps p.2
in enterprise data centers. In order to automate the implementation of a
granular microsegmentation security strategy, visibility into the network
Microsegmentation Security: traffic and both the workload and application configurations will be needed.
Your Key to Zero Trust p.6
This is really the key to transforming a segmentation strategy into one that
adheres to zero-trust principles.
Key Steps to Put Your Zero-
Trust Security Plan Into Action By creating a layer of policy enforcement that travels with workloads
pppppppppppppppppppp p.11 wherever they go, organizations have a much stronger chance of protecting
data regardless of where the instance runs. In some ways, this does shift
About SearchSecurity p.15 security policy and access control back to the individual instances versus
solely within the network itself, but hybrid cloud architecture designs don't
easily accommodate traditional networking models of segmentation.
Dynamic assets like virtual instances (running on virtualization infrastructure
technology) and containers are difficult to position behind "fixed" network
enforcement points, so organizations can adopt a zero-trust
microsegmentation security strategy that only allows traffic to flow between
approved systems and connections, regardless of the environment they are
in. Virtual systems can employ a hypervisor backplane that all
communications and behaviors are linked to, facilitating zero trust in a more

Page 7 of 15
E-guide

scalable way. There are also physical models that accomplish this, too, using
In this e-guide specific network switches and connectivity platforms that have policy
evaluation controls built in.
Zero-Trust Security Means
New Thinking Plus Practical
Steps p.2

Microsegmentation Security:
Your Key to Zero Trust p.6

Key Steps to Put Your Zero-


Trust Security Plan Into Action
pppppppppppppppppppp p.11

About SearchSecurity p.15

Page 8 of 15
E-guide

In this e-guide
What zero-trust microsegmentation security
Zero-Trust Security Means
delivers
New Thinking Plus Practical
Zero-trust microsegmentation prevents attackers from using unapproved
Steps p.2
connections to move laterally from a compromised application or system
regardless of environment. Essentially, zero trust facilitates the creation of
Microsegmentation Security:
"affinity policies," where systems have relationships and approved
Your Key to Zero Trust p.6
applications and traffic, and any attempted communications are evaluated
and compared against these policies to determine whether the actions
Key Steps to Put Your Zero-
should be permitted. This happens continuously, and effective zero-trust
Trust Security Plan Into Action
control technology will also include some sort of machine learning
pppppppppppppppppppp p.11
capabilities to perform analytics processing of attempted behaviors,
adapting dynamically over time to changes in the workloads and application
About SearchSecurity p.15
environments.

By potentially eliminating lateral movement, a zero-trust microsegmentation


security model also reduces the post-compromise risk when an attacker has
illicitly gained access to an asset within a data center or cloud environment.
Cloud design and operations teams -- and often DevOps teams -- refer to
this as limiting the "blast radius" of an attack, as any damage is contained to
the smallest possible surface area, and attackers are prevented from using
one compromised asset to access another. This works not only by
controlling asset-to-asset communication, but also by evaluating the actual

Page 9 of 15
E-guide

applications running and assessing what these applications are trying to do.
In this e-guide For example, if an application workload -- like web services such as Nginx or
Apache -- is legitimately permitted to communicate with a database server,
Zero-Trust Security Means the attacker would have to compromise the system and then perfectly
New Thinking Plus Practical
emulate the web services in trying to laterally move to the database server --
Steps p.2
even issuing traffic directly from the local binaries and services installed.

Microsegmentation Security: These are just a few of the benefits of a zero-trust segmentation strategy
Your Key to Zero Trust p.6 that can definitely help organizations to implement granular access control
policies across their internal and cloud data centers.
Key Steps to Put Your Zero-
Trust Security Plan Into Action
pppppppppppppppppppp p.11 Next Article

About SearchSecurity p.15

Page 10 of 15
E-guide

In this e-guide
Key steps to put your zero-trust security
Zero-Trust Security Means plan into action
New Thinking Plus Practical
Steps p.2 Dave Shackleford, Principal Consultant at Voodoo Security

Microsegmentation Security:
A zero-trust microsegmentation model for access control potentially has
Your Key to Zero Trust p.6 many benefits, but implementing this technology strategy requires
significant planning and coordination across teams. The first decision that
an organization will need to make is that of which technology to select in
Key Steps to Put Your Zero-
Trust Security Plan Into Action implementing zero-trust security. There are a number of vendors that offer
pppppppppppppppppppp p.11 microsegmentation tools, and there are many differences between the
various products:
About SearchSecurity p.15
• Network-centric products: Well-known networking companies have
begun to offer microsegmentation policy engines and enforcement
controls within network switches and other connectivity platforms.
The benefit of these products is usually a unified approach across
that vendor's hardware and often other vendors' as well, as long as
the network traffic crosses their switches. Drawbacks include vendor
lock-in and costs, as well as some potential limitations in moving to
cloud scenarios.
• Virtualization-specific products: Leading hypervisor providers may
offer zero-trust microsegmentation platforms, as well. These benefit

Page 11 of 15
E-guide

from deep integration with both the hypervisor and software-defined


In this e-guide networking, but may not be as applicable to physical systems.
• Stand-alone zero-trust security software: This is software that has its
Zero-Trust Security Means
own unique policy engine, as well as host-based software. While this
option may be the most flexible in some ways across internal and
New Thinking Plus Practical
cloud environments, it could also be prone to vendor lock-in and
Steps p.2
performance issues.

Microsegmentation Security: While looking at


Your Key to Zero Trust p.6 options, be sure to
consider platform
Key Steps to Put Your Zero- compatibility (some
Trust Security Plan Into Action legacy systems or
pppppppppppppppppppp p.11
certain operating
systems may not be
About SearchSecurity p.15 wholly compatible),
availability in cloud
environments, and
complexity or
operational
requirements for
management and
ongoing maintenance.

Page 12 of 15
E-guide

In this e-guide
Putting a zero-trust security tool to work
Zero-Trust Security Means Once the platform or tool of choice is selected, the next major planning
New Thinking Plus Practical element -- besides installation -- is policy design. Most of the leading
Steps p.2
providers of zero-trust security tools offer a form of "learning mode" that
you can start out in, and that's definitely the right choice for almost all
Microsegmentation Security: organizations -- enable the zero-trust engine and then monitor for what it
Your Key to Zero Trust p.6
sees. What you're looking to do is monitor what types of applications and
services are communicating between systems and network segments, and
Key Steps to Put Your Zero- map the communications to evaluate what is likely sanctioned and what
Trust Security Plan Into Action
might be malicious or unwanted traffic. When planning your policies, be sure
pppppppppppppppppppp p.11
to work closely with application, desktop and server operations teams to
better understand what is actually running in your environment, as these
About SearchSecurity p.15
teams will likely have a more accurate view of what communications should
be in place. This way, you can build consensus on policy implementation
before actually locking anything down.

At the same time, it's helpful to think about a "tagging" or "grouping" model
that makes the most sense in your zero-trust security architecture. In other
words, what systems are alike and which systems should be communicating
as part of defined application workloads? Common grouping strategies
include business units (systems owned or maintained by a specific group or
functioning as part of a business group), platform or application similarity (all

Page 13 of 15
E-guide

databases or Windows servers, for example), and sensitivity levels (all


In this e-guide systems in scope for PCI DSS compliance or those handling financial
transactions). Choosing sound grouping for policies will enable them to be
Zero-Trust Security Means implemented more quickly and effectively; it may also make the policy
New Thinking Plus Practical
design and governance discussions easier, since you'll likely be working with
Steps p.2
existing teams that know how their applications should be functioning.

Microsegmentation Security:
Your Key to Zero Trust p.6 About SearchSecurity

Key Steps to Put Your Zero-


Trust Security Plan Into Action
pppppppppppppppppppp p.11

About SearchSecurity p.15

Page 14 of 15
E-guide

In this e-guide
About SearchSecurity
Zero-Trust Security Means
IT security pros turn to SearchSecurity.com for the information they require
New Thinking Plus Practical
Steps p.2
to keep their corporate data, systems and assets secure. We're the only
information resource that provides immediate access to breaking industry
news, virus alerts, new hacker threats and attacks, security certification
Microsegmentation Security:
Your Key to Zero Trust p.6
training resources, security standard compliance, webcasts, white papers,
podcasts, Security Schools, a selection of highly focused security
newsletters and more -- all at no cost.
Key Steps to Put Your Zero-
Trust Security Plan Into Action
pppppppppppppppppppp p.11
For further reading, visit
About SearchSecurity p.15 SearchSecurity.com
Images; Fotalia

©2019 TechTarget. No part of this publication may be transmitted or reproduced in any form or by any means
without written permission from the publisher.

Page 15 of 15

You might also like