Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.

Zero-Trust Security 101

What are the tenets and fundamental spirit of zero-trust architecture -- without the marketing speak?

(Image: toodtuphoto via Adobe Stock)

Zero trust sounds so harsh. But real cybersecurity results can come from the harsh-sounding scheme that defines every relationship as fraught with danger and mistrust. Zero-trust security is a common topic of discussion in cybersecurity circles these days, but understanding it goes beyond the name. The simple-sounding strategy comprises several key components. 

No Soft, Chewy Center
The classic network model was described as a hard shell surrounding a soft center. The idea was that perimeter security would be so effective that nothing could get through to the network assets inside. The problem with the model is obvious.

No perimeter can be 100% effective 100% of the time. People began to ask, "How do we protect networks when the assumption must be that attackers will get inside the perimeter?" The answer? More perimeters.

And "zero trust" was the label, coined by John Kindervag, now field CTO at Palo Alto Networks, when he was vice president and principal analyst at Forrester Research.

A Perimeter in Every Pot
What if every network segment, every application, and every critical data resource was its own perimeter requiring authentication? Attackers who made it through the external network perimeter might be limited in the damage they could do,because they could not get into important network and data resources.

In order to make an attacker's job as difficult as possible, authentication requirements can divide the network into many small regions -- a process known as microsegmentation. Each of the segments can be defined and protected by a next-generation firewall to ensure that only authorized users, devices, services, and traffic can move between segments and protected resources.

Least Privilege for Smallest Resource
To keep the risk at each segment as small as possible, user and device privileges tend to be assigned according to the principles of least privilege, in which each authenticated agent has only the privileges required to access that segment; privileges don't carry over between segments.

By limiting the privilege of each account and limiting the scope of each segment, zero-trust networks limit the damage that can be inflicted by any attacker. Zero-trust architectures have the additional benefit of being reconfigured more easily than more traditional networks because the scope of any single change is limited in reach. New segments can be added, or segments can be dropped, without requiring changes across the entire network.

Related Content:

About the Author

Curtis Franklin, Principal Analyst, Omdia

Curtis Franklin Jr. is Principal Analyst at Omdia, focusing on enterprise security management. Previously, he was senior editor of Dark Reading, editor of Light Reading's Security Now, and executive editor, technology, at InformationWeek, where he was also executive producer of InformationWeek's online radio and podcast episodes

Curtis has been writing about technologies and products in computing and networking since the early 1980s. He has been on staff and contributed to technology-industry publications including BYTE, ComputerWorld, CEO, Enterprise Efficiency, ChannelWeb, Network Computing, InfoWorld, PCWorld, Dark Reading, and ITWorld.com on subjects ranging from mobile enterprise computing to enterprise security and wireless networking.

Curtis is the author of thousands of articles, the co-author of five books, and has been a frequent speaker at computer and networking industry conferences across North America and Europe. His most recent books, Cloud Computing: Technologies and Strategies of the Ubiquitous Data Center, and Securing the Cloud: Security Strategies for the Ubiquitous Data Center, with co-author Brian Chee, are published by Taylor and Francis.

When he's not writing, Curtis is a painter, photographer, cook, and multi-instrumentalist musician. He is active in running, amateur radio (KG4GWA), the MakerFX maker space in Orlando, FL, and is a certified Florida Master Naturalist.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights