Chapter 16
Zero Trust Architecture — Trust Nobody, Verify Everything
Listen to this article
I. Core Principles & Philosophy of Zero Trust
- "Never Trust, Always Verify": Zero Trust Architecture (ZTA) moves defenses away from static, network-based perimeters and assumes that no user or device is implicitly trusted based on their physical or network location.
- Resource-Centric Security: Authentication and authorization are discrete functions continuously evaluated on a per-transaction basis before any session to an enterprise resource is established.
- The Seven Tenets of ZTA:
- All data sources and computing services are treated as resources.
- All communication is secured regardless of network location.
- Access to individual enterprise resources is granted on a per-session basis.
- Access is determined by dynamic policy, evaluating the observable state of the client identity, application, requesting asset, and environmental attributes.
- The enterprise continually monitors and measures the integrity and security posture of all owned and associated assets.
- All resource authentication and authorization are dynamic and strictly enforced before access is allowed.
- The enterprise collects as much information as possible about the current state of assets and network infrastructure to improve its security posture.
II. Logical Architecture Components
- Policy Decision Point (PDP): The central brain of a ZTA, which is broken down into two logical components:
- Policy Engine (PE): Uses a trust algorithm, enterprise policies, and external data to ultimately grant, deny, or revoke access to a resource.
- Policy Administrator (PA): Acts on the PE's decision by generating session-specific tokens and sending commands to establish or shut down the communication path.
- Policy Enforcement Point (PEP): The gatekeeper that resides close to the resource to enable, monitor, and terminate connections between a subject and the resource.
- Control Plane vs. Data Plane: ZTA separates network communications. The control plane handles access decisions and configurations between the PA and PEP, while the data plane is used strictly for the actual application/service communication flows.
- Data Sources: The Policy Engine evaluates inputs from various systems, including Continuous Diagnostics and Mitigation (CDM) tools, threat intelligence feeds, SIEM systems, Identity Management databases, and enterprise PKI.
III. Architectural Approaches & Deployment Models
- Core Approaches: ZTA can be primarily driven by Enhanced Identity Governance (basing policies on identity and assigned attributes), Micro-Segmentation (placing individual resources on heavily protected network segments), or Software Defined Perimeters (overlay networks controlled by the PA).
- Deployment Models:
- Device Agent/Gateway-Based: A software agent installed on the client device coordinates connections with a gateway placed directly in front of the resource.
- Enclave-Based: Similar to the gateway model, but the gateway protects a collection of resources (an enclave or data center) rather than an individual application, which is useful for legacy systems.
- Resource Portal-Based: A single gateway portal acts as a gatekeeper for requests without requiring installed agents on client devices, making it highly flexible for BYOD (Bring Your Own Device).
- Device Application Sandboxing: Approved applications run completely compartmentalized (e.g., in virtual machines or containers) on an asset to protect them from potential host malware.
IV. The Trust Algorithm (TA)
- Purpose: The thought process used by the Policy Engine to grant or deny access based on inputs like the access request, subject history, asset status, resource policies, and threat intelligence.
- Evaluation Methods: TAs can be criteria-based (all predefined qualifications must be strictly met) or score-based (calculating a confidence level based on weighted data sources).
- Contextual vs. Singular: A singular TA evaluates each request in a vacuum, while a contextual TA tracks the subject's recent history to detect atypical behavioral patterns that may indicate a compromised account.
V. Migration & Implementation Strategy
- Discovery and Inventory: Because the Policy Engine requires deep organizational knowledge to make accurate decisions, the enterprise must thoroughly catalog all actors (subjects/users), enterprise-owned assets, and shadow IT.
- Identify Workflows: Organizations must map out business processes, data flows, and associated risks to select a candidate process for initial ZTA migration (often starting with cloud-based resources or remote workflows).
- Formulate Policies and Select Solutions: Define access criteria based on the workflow and choose solutions compatible with existing ecosystem constraints.
- Initial Deployment & Tuning: Most enterprises will operate in a hybrid zero-trust/perimeter-based mode indefinitely. Initial deployments should run in an observation/reporting-only mode to establish baseline behaviors and tune access criteria before strictly enforcing access denials.
VI. Threats and Security Considerations in ZTA
- Subversion of the ZTA Decision Process: If the Policy Engine or Policy Administrator is compromised or misconfigured by an administrator, an attacker could grant unauthorized access or disrupt enterprise operations.
- Denial-of-Service (DoS): If the PEP or PE/PA are taken offline via a DoS attack or hosting failure, legitimate subjects will be unable to access necessary enterprise resources.
- Stolen Credentials and Insider Threats: While ZTA prevents unauthorized lateral movement across a network, an attacker with valid credentials can still access the specific resources assigned to that account's purview.
- Network Visibility Gaps: ZTA assumes all traffic is inspected, but much of the traffic may be encrypted or opaque to layer 3 analysis tools, requiring reliance on metadata and machine learning to detect malicious patterns.