Zero Trust Security || Framework of IT Conceptual Security model


About Zero Trust Security?

Zero Trust is new framework for network information security model which is developed for strengthening  the security in the the past companies protecting themselves by building a layers of firewall around the network, everything inside the network is consider as trusted and everything is outside the network is considers untrusted.

✍🏼 The Zero Trust IT Security Framework model was created in 2010 by John Kindervag, who working as principal analyst at Forrester Research Inc.

The existing firewall rule’s are created on trusted IP’s , trusted Interfaces etc. They use firewall and other technology to create security parameters, but if the security parameters breaches, the attackers get trusted network access of critical resources.

Now today employee work are increasingly on the go,  as they are working remotely  from multiple locations and everyone need applications (share point , email , workday) access from multiple mobile devices  and expecting instant access to the cloud network resources. The network is no longer in your control , resulted in an increasing risk of exposure, dissolving what was once the trusted enterprise zone of control and leaving many organisations exposed to data breaches, malware and ransomware attacks. Protection is now needed where applications and data, and users and devices, are located.

Today security parameters are people’s who are accessing your network, people with parameters identity become single control access across users, devices and network. The Zero trust security model recognise the trust need to move beyond the network parameters, no matter their locations and devices.Ensuring the right people’s have right access to right resources.

Zero trust concept compile strict identity based verification for every users and device trying to access resources on a private network as well as cloud, regardless of whether they are sitting within or outside of the network perimeter. No single specific technology is associated with zero trust; it is a holistic approach to network security that incorporates several different principles and technologies.Zero Trust security model architecture simply designed to protect digital environments by leveraging network segmentation, preventing lateral movement, providing Layer 7 threat prevention, and simplifying granular user-access control.

Zero trust is simple concept, we eliminating the concept of trust within the network, we say there are no more trusted interfaces , no more trusted users , no more trusted packets and no more trusted application.

✍🏻 Zero trust is a complete security framework model to securing all access across your networks, applications, and environment. The idea behind zero trust framework is to verify the user trustworthiness before granting access when someone requesting access to your network resources.This approach helps secure access from users, end-user devices, APIs, IoT and cloud Apps . It protects your workforce, workloads, and workplace.

Concept of Zero Trust-

Zero Trust framework provides the visibility and IT controls needed to secure, manage and monitor every device, user, app and network being used to access business data. It also involves on-device detection and remediation of threats.

1. All resources are accessed in secure manner regardless of locations.

2. Access control is on need to know basis and strictly enforced.

3. Inspect and logs all traffic.

Across the industries security professionals are shifting the security diameter to zero security trust state of mind and quick adopting and implementing the approach of zero trust security network model in the environment. Zero trust is more then just concept, it is robust security model that following 7 security principles – Data , Devices , workload , Automation and orchestration , visibility and analytics , users and network.

The slogan of “zero trust” security approach is never trust alway verify.Zero trust security framework is designed based on a user identity verification process with MFA (Multi factor authentication).

Zero Trust Security model redefine the concept of trustworthiness for organizations should not trust anything inside or outside the network.Organizations must re-consider the old model of “trust but verify”, which confidence on well-defined boundaries.Zero Trust model describes that  “Never Trust, always validates” and mimimize the risk and improve the visibility before granting environment access to the users.

Author: Ronnie Singh

Your Feedback is Valuable for us. Pls do comments.