What is the zero trust security model and why was it introduced?
The concept of zero trust security isn’t new; the term was coined by Forrester Research Inc. back in 2010 and was initially synonymous with a network security approach known as micro-segmentation. Micro-segmentation is a way to create secure zones in data centers and cloud deployments that allow you to isolate workloads and protect them individually.
This approach is attractive because the traditional security perimeter was no longer proving effective at cybersecurity control. Fast-growing technologies, such as cloud, mobile, and virtualization, made the security boundaries of an organization blurry. For years organizations protected their valuable and sensitive data by building a fence around those assets, and all the data that flowed in and out was either via a single internet access point or on physical devices. This meant that a traditional perimeter was an effective measure as the boundaries were known and controlled.
As long as internet access was managed, it was possible to protect, monitor, and control the data that flowed through it.
If your users are accessing more IT services outside the security perimeter than inside, how protective can the perimeter really be?
Organizations protected internet access with firewalls, VPNs, access controls, IDS, IPS, SIEMs, email gateways, and so forth, building multiple layers of security at the so-called perimeter. On physical devices, systems management and antivirus protected those systems and kept them updated with the latest security patches. This traditional defense in depth security approach has been used for almost 30 years, but in today’s world, it’s no longer enough. If your users are accessing more IT services outside the perimeter than inside, how protective can the perimeter really be?
Trust, in the past, was something that we heavily relied upon. Once an employee had a corporate laptop and authenticated, they were then expected to do their job and not abuse the trust entitled to them. However, cybercriminals took advantage of that exact flaw in the security model by abusing trusted user identities and compromising their credentials to gain access to company systems and sensitive information under the guise of authorized employees.
Today, trust is being abused by cybercriminals targeting unsuspecting employees' personal accounts to gain access, later elevating to privileged accounts that can move around corporate networks undetected, and roaming around the network for months or even longer. Once attackers gain access to the internal network they typically have access to the entire network as everything inside the network is automatically trusted. This is why the zero trust security model was introduced—to address a new stance on trust: never trust and always verify.
Want to dive into the world of cybercriminals and their attack strategies? Go watch Delinea’s On-Demand webinar “Inside the Mind of an Ethical Hacker.”