Introduction to Zero Trust Network​

Zero trust (ZT) is a ‘never-trust-always-verify’ framework used by IT organizations to increase defenses against external attack to steal sensitive data, private information and resources. IT and enterprise architects use zero trust architecture (ZTA) based on zero trust principles to design and implement robust and resilient infrastructure. When zero trust is applied to protect  data-in-transit by securing network and communication it is called Zero Trust Network (ZTN).

The idea of zero trust in networks is getting famous among enterprises after 2020, because of the following drivers:

  • Increase remote users and workforce with BYOD connected over the network
  • Rise in cloud-based assets located outside the enterprise’s network boundary
  • De-globalization and cyber threats across the world
  • Strict focus on compliance and regulations to secure network
  • Adoption of Kubernetes container orchestration platform for scale

 

ZTN can be achieved by removing or reducing trust on users and applications on assets or resources irrespective of the network location. With growing microservices in hybrid cloud, it can be a very daunting task to choose various applications to implement. The best approach to achieve ZTN is using service mesh (we will talk about it in our next blog). 

Top 10 pillars of Zero Trust Network

As per SP 800-207 laid out by the US governmental organizations National Institute of Standards and Technology (NIST) and National Cybersecurity Center of Excellence (NCCoE), and our decades of expertise wrt implementing zero trust at large enterprise, we propose 10 pillars security and compliance IT managers should consider to achieve Zero Trust Network (ZTN). 

  1. Identity using Authz/Authz
  2. Secure channel using mTLS-based communication
  3. Certification management
  4. RBAC, Multitenancy and Isolation
  5. Whitelisting trusted source
  6. FIPS and SOC-2 compliance
  7. Web-Application Firewall
  8. Data loss prevention
  9. Vault key/secret management

1. Identity using Authn/Authz

Identity means validating the digital identity of a user over their usage of resources such as web applications, APIs, platforms, devices, or databases. A user can be a human- customer, employee, consultant member, participant, or a machine- an application, an API call, hardware devices, etc. Identity of a user along his permissions to use resources, can be verified and validated using the authentication and authorization (Authn/AuthZ) mechanisms.  Apart from identity management the security requirements of organizations to deal with multiple microservices, would involve granular controls for user and applications, compliance standards, RBAC, etc. In real life, IAM can be really complicated to achieve. 

2. Secure channel using mTLS based communication

Mutual Transport Layer Security (mTLS) is a method for authentication between two parties connected over a network. mTLS based communication is highly secured between two parties ( say client and server) as each application authenticates itself first using X.509 certificates and the communication happens based on private keys which also rotate in regular period. mTLS is considered as the successor of Secure Socket Layer (SSL). 

3. Certification management 

Securing connection between the two parties is one part, while certificate management and rotation is an ongoing maintenance part. In cases of regular upgradation of security policies, or security breaches, the old certificate will not be vaid. Cloud architects and platform engineers should think of an effective way for administrators and Ops teams to easily rotate SSL or SAML certificates, generate private keys and distribute among all the microservices. 

4. RBAC, Multitenancy and Isolation

It is an ongoing task to allow or deny users to read/write/delete permission to various resources. Necessary controls should be in place to implement granular policies for role-based access controls (RBAC). Large organizations typically would need to create a dedicated workspace for various projects or platform teams, and there should be provisions to practice multi-tenancy as part of security measures. 

5. Whitelisting trusted source

Perhaps the simplest ‘cybersecurity measures’ practiced by security engineers, Whitelisting involves giving administrator approved IPs and application access to a system. This is particularly very helpful in recent scenarios of BYOD, where certain applications are allowed to login resources in the VPN. 

6. FIPS and SOC-2 compliance (for the US-based companies)

The US-based agencies such as NIST and American Institute of Certified Public Accountants (AICPA) provide guidance and FIPS and SOC regulations for every IT organization. As per the NIST regulation, all the non-military, govt agencies and vendors must comply with Federal Information Processing Standards (FIPS) standard. Similarly, System and Organization Controls (SOC) standards specify the way service organizations should handle customer data; it covers 5 major aspects- security, availability, processing integrity, confidentiality, and privacy of customer data. So for any company operating out of North America, complying to compliance such as FIPS and SOC-2 are important. 

7. Web-Application Firewall

Web application firewall (WAF) helps protect web-application from attacks such as DOS attack, SQL injection attack, cross-forgery, etc. WAF is a L7 protocol which acts as a shield for web-applications, and network engineers can create various rules and policies such as traffic filtration to protect against vulnerabilities in the application.

8. Data loss prevention

Data Loss Prevention (DLP) is the practice of detecting and preventing data breaches, exfiltration, or unwanted destruction of private information. DLP is also a part of SOC-2 compliance. The primary aim of the DLP act is to prevent illegal transfer of data outside organizational boundaries. Network team and cloud engineers should focus on building a system which is robust to threats from malicious insiders or external ransomware. 

9. Secret management

In Kubernetes many services inside or outside the cluster talk to each other using secrets. Developers should practice proper secret management- a practice of storing sensitive data such as passwords, keys, and tokens, in a secure environment such as Vault with strict access controls.

10. Multicluster visibility 

IT organizations using cloud and containers profusely should have a central plane for multiclsuter visibility. They should be able to see workloads, resources, infrastructure such as ingress and load balancers along with the health and performance status across all the namespace and cluster. SREs should be empowered with real-time logs and metrics aggregation and analysis to reach any situation faster with quick diagnosis.

Debasree Panda

Debasree Panda

Debasree is the CEO of IMESH. He understands customer pain points in cloud and microservice architecture. Previously, he led product marketing and market research teams at Digitate and OpsMx, where he had created a multi-million dollar sales pipeline. He has helped open-source solution providers- Tetrate, OtterTune, and Devtron- design GTM from scratch and achieve product-led growth. He firmly believes serendipity happens to diligent and righteous people.

Leave a Reply