RSI Security

What is the NIST Zero Trust Architecture?

NIST

Many current cybersecurity plans and models follow an older set of priorities that hinge upon the importance of strong perimeter defense. To use a physical analogy many cybersecurity architectures focus on building up the walls and moats protecting the very outside of your castle from attack. But inherent in these schemes is an implicit trust of everyone already inside.

And of course not every subject is a loyal one.

In today’s ever-more-remote landscape the usefulness of these perimeter-focused schemes is eroding. There are as many threats within as there are without, and the line dividing “inside” and “outside” is growing blurrier by the day. Cybersecurity schemes need to be built accordingly.

Enter zero trust architecture.

 

What is the NIST Zero Trust Architecture?

It’s a plan for building cyberdefenses that meet the challenges of our increasingly cloud-based and remote digital world. Nowadays, companies are expanding their networks and systems far beyond the confines of physical infrastructure, like offices and headquarters. Doing so increases flexibility, but it also diminishes the effectiveness of defenses tailored to those physical contexts.

Businesses need cybersecurity planning to respond to this new reality.

That’s why the National Institute of Standards and Technology (NIST) is currently drafting a detailed plan for Zero Trust Architecture in NIST Special Publication 800 207. This document lays out a comprehensive guide to zero trust architecture, justifying it in the face of evolving security threats, and explaining how to implement it in any company.

This blog will break down all the most important information from the NIST SP 800 207, diving into what zero trust is and how it works.

But first, let’s get into why it’s important.

 

Assess your NIST compliance

 

Why Zero Trust?

Because with great mobility comes great danger.

Even before the onset of the COVID-19 pandemic, prudent businesses have been optimizing workflows by mobilizing and extending workforces outside of their physical buildings. However, the height of the pandemic has necessitated social distancing and work from home (WFH) practices for workers across the world. Business continuity has required mobility.

Mobility challenges boundaries and security measures that rely on them.

As businesses rely more on remote digital access to their networks, they open themselves up to a host of concerns. These include:

In an office, control over hardware, software, and networks enable a sense of implicit trust for all users accessing them. That goes out the window when the office is someone’s home.

Regardless of individuals’ own actions and intentions, any system that operates remotely is simply not as “trustworthy,” cybersecurity wise, as a controlled environment.

In the face of accelerating mobility, it’s time to abandon that trust altogether.

What is Zero Trust?

It’s a paradigm shift—a new way to think about securing your company’s digital assets that focus on the resources themselves rather than the networks they exist within.

Zero trust is based on assumptions, just like perimeter-focused cyberdefense is. However, the assumptions are the exact opposite of their counterparts:

As its name implies, zero-trust is inherently more shrewd in terms of the trust and agency it grants to individuals. By assuming that there is no “outside” and anyone can be a threat, it significantly restricts access to all resources.

While this revolutionary paradigm is the future of cybersecurity, it’s also nothing new.

 

History and Legacy of Zero Trust

Zero trust as a concept long predates the distanced realities of 2020. Zero trust architecture is already in use throughout governmental bodies and in certain private sectors, including especially information technology. It’s also prevalent in higher education.

The driving ideology behind zero trust architecture predates the terminology of “zero trust” itself.

As early as 1994, the Jericho Forum (now the Open Group) was preaching the virtues of what it called “de-perimeterized” cybersecurity. Its Jericho Commandments, updated most recently in 2007, were devoted entirely to re-orienting cyberdefense away from the perimeter. They focus on assets, assume a “hostile world,” and warn against assumption of context.

In 2007, the Department of Defense incorporated a scheme called “black core” into its Global Information Grid Architectural Vision. Like the Jericho Forum’s plan, this DoD mandate shifted focus away from the perimeter and onto safety at the level of individual transactions.

These are foundational zero trust concepts, all of which are echoed in today’s architecture.

 

Basic Tenets of Zero Trust

The conceptual framework for zero trust architecture is composed of the tenets of zero trust. These tenets span all dimensions of what zero trust assumes and various conclusions emanating forth from those premises.

Here is the breakdown of the key elements of zero trust’s logic:

Across these seven tenets, a robust framework of safety emerges from the complexity and dynamism of each practice prescribed. Abiding by these basic principles ensures the maximum security that a zero trust architecture can provide.

But how does it work?

How Zero Trust Architecture Works

Zero trust architecture is a realization of the tenets outlined above. It works by turning those theoretical concepts into practices. That includes naming entities, establishing relationships, and installing restrictions and control points where authentication is required.

A zero trust architecture depends upon the successful implementation of its components.

 

Key Components of Zero Trust Architecture

In order to successfully deploy a zero trust architecture, there are certain components that must be installed, with specific relationships between them, to enable the tenets outlined above. These components can exist on the premises of your business, in remote or cloud services, or in some combination of the two.

The foundational, core components are comprised of the following:

In addition to these, there are also operational components and inputs that provide the information that the PE uses to make its decisions. These include:

The components detailed above may be distributed in various different ways across any number of assets. They may even be optimized and unified into one single asset.

By installing all of these components you can integrate a zero trust architecture throughout every element of your company. However, this is not the only way to integrate zero trust architecture. There are also…

 

Alternative Methods for Zero Trust Architecture

Beyond the components detailed above enterprises may also take other approaches to implementing a system analogous or similar to a fully-fledged zero trust architecture.

Some of these approaches include:

Any of these methods can provide protection, just like the components above.

However you achieve it, zero trust architecture is one of the most effective ways to secure your business from the unique threats posed by our remote digital landscape. No cybersecurity scheme can ensure 100% safety and completely eliminate risks, but zero trust comes close.

Zero trust or not, professional cyberdefense is the best way to minimize your risks and maximize your security.

 

Zero Trust, Heroic Cyberdefense

At RSI Security our mission is helping businesses shore up their cybersecurity in all dimensions. Our qualified experts will work with you to implement the perfect zero trust architecture for your particular situation.

Our overall NIST advisory services include analysis, training, and support to help you meet and exceed the parameters of NIST 800 207 and all compliance needs.

But that’s not all.

We’re industry leaders with over a decade of experience providing cybersecurity solutions to companies of all sizes and types. Contact RSI today, and we’ll craft a cyberdefense profile that’s tailored specifically to your needs.

 

 

Exit mobile version