Zero trust security is a concept developed by John Kindervag and Forrester Research Inc. in 2009.<\/strong> (Forrester)<\/a><\/p>\n\n\n\n
Also called zero trust network architecture<\/a>, the idea of zero trust security is really a diametrically opposing view to the conventional \u201cperimeter-based\u201d architecture of security over the last twenty to thirty years. With recent identity breaches, vendors and analysts are wondering whether a zero trust security model could work to prevent compromises.<\/p>\n\n\n\n
Kindervag describes traditional network security models as being akin to \u201c\u2018. . . an M&M, with a hard crunchy outside and a soft chewy center\u2019\u201d (Forrester<\/a>). IT organizations would create a perimeter \u201cfortress\u201d around their network and then create layers of security so that hackers would struggle to get through them. <\/p>\n\n\n\n
In the modern era, however, bad actors are everywhere, and the traditional method of security leaves something to be desired, as more and more hackers have started attacking networks from both inside<\/em> and out. <\/p>\n\n\n\n
The chart above from a NIST report on Forrester\u2019s development of the zero trust security model shows the most common sources of security breaches from 2011-12. Almost 50% of these attacks originated from inside an organization, while only 25% of those were headed by external sources. In other words, in today\u2019s world, more security threats come from inside an organization.<\/p>\n\n\n\n
So, does the traditional, perimeter-based security model still work?<\/strong><\/em><\/p>\n\n\n\n
If a network is an M&M, it\u2019s clear that the \u201chard outer shell\u201d isn\u2019t doing it\u2019s job to protect the \u201cchewy center.\u201d But the zero trust security model doesn\u2019t rely on a hard outer shell. <\/p>\n\n\n\n
The mindset behind zero trust security is to regard all sources of network traffic, both external and internal, as potential attack vectors. Therefore, all users and resources must be verified and authenticated, system data must be collected and analyzed<\/a>, and network access and traffic must be limited and monitored<\/a>.<\/p>\n\n\n\n
Today, data and applications are stored directly on the internet with SaaS providers and cloud infrastructure. Users are located around the world and need to be able to access their IT resources. Meanwhile, on-prem networks are looking more like internet cafes with WiFi than the fortresses of the past. Hackers no longer need to step through layers of security measures; rather, they can choose specific types of IT resources to target.<\/p>\n\n\n\n
The result is that IT organizations are considering different ways to approach how they protect their environments, especially regarding authenticating user identities. It was recently reported that over 81% of all breaches are caused by identity compromises (CSO<\/a>). <\/p>\n\n\n\n
IT security experts have been developing a set of identity security practices<\/a> that can solve this problem. The simplest, yet most powerful, way to confirm identity is to leverage a multi-factor authentication <\/a>(MFA) approach. Requiring a second factor for machines, as well as applications, eliminates a massive level of risk by ensuring that leaked credentials alone won\u2019t be enough to ensure access.<\/p>\n\n\n\n
When you fortify MFA capabilities with strong passwords<\/a>, SSH keys<\/a>, and strong internet hygiene (i.e. ensuring that you are safe on the web with SSLs\/https and only going to credible sites), you can further reduce the chances of a breach. By requiring significant step ups in authentication, as well as a keen policy of internet vigilance, IT organizations can adopt a zero trust security model and apply it to identity management.<\/p>\n\n\n\n
To learn more about leveraging a zero trust security mindset in your identity management solution,\u00a0contact us<\/a>.\u00a0If you are interested in an all-in-one, cloud-based zero trust solution,\u00a0try JumpCloud\u00ae<\/sup>\u00a0Directory-as-a-Service\u00ae<\/sup><\/a>. <\/p>\n\n\n\n
With JumpCloud, you can implement MFA, password restrictions, centralized user management, access controls and more, as well as a platform-agnostic directory service. Schedule a demo<\/a> of JumpCloud, and see what it has to offer.<\/p>\n\n\n\n
<\/p>\n<\/div>\n\n\n\n
<\/p>\n","protected":false},"excerpt":{"rendered":"
Zero trust security is a term that\u2019s being thrown around a lot in the world of identity management today.\u00a0But, what is zero trust security? Let’s find out.<\/p>\n","protected":false},"author":70,"featured_media":16273,"template":"","categories":[2337],"collection":[2775],"wheel_hubs":[],"platform":[],"resource_type":[2310],"funnel_stage":[],"coauthors":[2515],"acf":[],"yoast_head":"\n