Josef Stalin is supposed to have once said, “I trust no one, not even myself”. While murderous dictators are normally not reliable sources of useful information, this quote properly summarizes the essence of the Zero Trust architecture, which the National Institute of Standards and Technology (NIST) defines as:
“The term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location or based on asset ownership. Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established.” [1]
In essence, Zero Trust is what its name implies: no user, device, asset or resource is implicitly trusted, but instead must be authenticated and approved each time it attempts to access a network, cloud service, data repository or some other resource.
So why the need for and interest in Zero Trust? In short, it’s because the network perimeter that was more or less defensible when everything was behind a corporate firewall just doesn’t exist anymore. Yes, there are still corporate assets maintained on-premises behind firewalls, gateways and the like, and this will continue to be the case indefinitely. But in most organizations, users, assets and other resources are located well outside of any defensible perimeter and are using a large number of different networks, devices, applications, and cloud services. While the network perimeter has been diminishing for some time, the COVID pandemic, ensuing lockdowns, and the rapid increase in employees working from home in early 2020 more or less made the network perimeter a relic of the past.
In support of that assertion is data from Netskope’s February 2021 Cloud and Threat Report[2]:
In a nutshell, this data strongly suggests that cloud apps are exploding in popularity, particularly with employees who are working from home, the vast majority are not trustworthy, and bad actors are using them to distribute malicious content.
This message has not been lost on IT and security decision makers. We discovered in a survey that Osterman Research conducted for BIO-Key International in May 2021 that while only 33% of the mid-sized and large organizations have today implemented a Zero Trust architecture, another 59% are planning to do so. Among the most immediate changes these organizations have made or will make in support of Zero Trust are creating and/or updating current security policies (cited by 69% of survey respondents), replacing existing technology and solutions (58%), implementing new technologies and solutions (58%), and implementing multi-factor authentication (MFA) (54%).
As implied by the data on Zero Trust adoption, a small percentage (8%) of organizations have no plans to implement Zero Trust. Why? In most cases, it’s not based on the perceived lack of benefits afforded by Zero Trust, but instead is simply because of a lack of time, budget or staff members to implement and manage it. Some who are not planning to implement Zero Trust are unsure of what it actually is or how to implement it, indicating that more education on its benefits will be required.
So what exactly are the benefits of Zero Trust?
While Zero Trust is not a panacea that will prevent every network intrusion or data breach, it goes a long way toward addressing many of the key security issues that organizations face, particularly in an environment in which their attack surface has expanded dramatically.
To get the most use out of implementing Zero Trust, your organization needs to have a multi-factor authentication solution. MFA requires end users to provide two or more verification factors and is an added layer of security on top of a simple password. Based on the survey exploring Zero Trust in organizations, 59% are planning on doing so, and the first step to approaching Zero Trust is through implementing Multi-factor Authentication.
Learn more about how multi-factor authentication approaches differ from more traditional methods and enable Zero Trust in our State of MFA eBook.
[1] https://www.nist.gov/publications/zero-trust-architecture
[2] Source: Netskope