• 07948 570815
  • This email address is being protected from spambots. You need JavaScript enabled to view it.
Advice for Successful Zero-Trust Implementation

Advice for Successful Zero-Trust Implementation

The zero-trust concept is often reffered to as “trust no one, verify everything.” No enterprise can stop off the myriad of cyberthreats as long as they assume that any individual element can be trusted as secure.

No traffic at all, whether internal or external, can automatically be deemed safe, so organisations must simply stop trusting anything or anyone.

Of importance is, zero trust transforms the way current cybersecurity strategies are orchestrated and executed. While zero trust was first put forward around 10 years ago, interest has recently surged – and a host of new micro-segmentation solutions have been created – to actualise the model and put it into play.

Here are a few points to consider when implementing a zero-trust approach.


Implementing Micro-Segmentation

Implementing micro-segmentation and authentication is a necessary but an arduous process. An IT team must carefully map huge numbers of data processes and workloads across every individual, network and device present in the organisation, including third-party actors. A single mistake in the configuration, and an organisation can be set back a day’s worth of productivity or more. Meanwhile, even minute changes to authentication processes can negatively impact the user experience and significantly impede productivity. As individuals, devices and process are added or removed, policies and permissions must be updated and maintained. As a result, zero trust requires ongoing vigilance and management.

Do Zero-Trust Organisations Really Trust No One?

Micro-segmentation and related solutions go the distance to secure networks and data from everyone and everything. However, gaps still remain in truly isolating all traffic within the network and from the outside. 

Surprisingly, web browsing is a primary area of risk not covered by micro-segmentation or other related zero-trust solutions. Browsing plays a huge role in today’s business environment and together with malicious email (much of which links to the web), it continues to be a dominant vector through which malware penetrates organisations. Micro-segment as granularly as you like, but it cannot prevent browser-based malware and threats, including many ransomware variants, cross-site scripting attacks and drive-by downloads, from gaining a grip in your network.  Many zero-trust supporters suggest whitelisting trusted sites as the answer, while rejecting access to all other sites.

This method of limiting access to all but known sites has been known to hamper productivity and frustrate employees.
Limiting access creates obstacles for users and burdensome busywork for IT staff.

Users must constantly request access and wait, while IT staff must shift their attention from more important tasks to manage, investigate and respond to such requests. Hypothetically, even if organisations could whitelist every site their users needed access to, they still run the risk of being vulnerable to malware that can infiltrate by means of legitimate sites.

There is no way to know with for certain what is transpiring on the backend of even whitelisted sites, and even the most mainline sites have been known to serve malicious ads or be infected with malware.

While URL filtering, anti-phishing software, web gateways, and other detection and signature-based solutions can stop most attacks, most of the time, they cannot hermetically block all threats from the web.  For complete airtight security, no website should be trusted, yet users must be able to access the sites that they need to visit.

Norton360 by Symantec 300x600

Zero-Trust for the Web

The zero-trust model can accommodate the web by trusting no site to interact with vulnerable endpoint browsers and through them, organisational networks.

One increasingly talked-about way to do this is remote browser isolation — an idea that operates under the assumption that nothing from the web is to be trusted. Every website, item of content and download is suspect. But to avoid the issue with impacting the user experience, all browsing takes place remotely, on a virtual browser.

passwordsAlso see: Strong Passwords Matter

The virtual browser can be housed in a disposable container located in a DMZ or in the cloud. Users interact naturally with all websites and applications in real time via a safe media stream that is sent from the remote browser to the endpoint browser of their choice, so no content touches the user device. When the user is finished browsing, the container and all its contents are destroyed.

Whitelisting isn’t necessary, and users can transparently interact with any sites that they need, without access requests.

To summarise: The zero-trust objective is to implement granular security policies that allow organisations to control what communications can and can’t be allowed between the different entry points on the network, and which individuals are privy to each. All devices, networks and IP addresses are micro-segmented, and access to individual components are restricted in accordance with security policies and user authentication. It’s the right approach, but to be successful, recognise that it’s a big job with some not-so-obvious considerations when it comes to effectively implementing the concept.


More From Our Blog