InfoGuard AG (Headquarter)
Lindenstrasse 10
6340 Baar
Switzerland
InfoGuard AG
Stauffacherstrasse 141
3014 Bern
Switzerland
InfoGuard Deutschland GmbH
Landsberger Straße 302
80687 Munich
Germany
This probably sounds very familiar to you – dashing from your home office to meet the client, then on to a meeting in the office, and rapidly answering a few e-mails on your way home. Your notebook and smartphone are connected to the Internet everywhere you go, and being available at all times is virtually an obligation. However, behind the scenes, working like this can have unexpected side effects.. We will show you what they are, and how to counteract them.
All devices, especially ones that are used outside the limits of the company to connect to the Internet, could be infected by malware. This also applies to your clients or, for instance, a co-working space, because you cannot be sure how conscientiously IT security is implemented there.
Do you connect your notebook to your home Wi-Fi? Almost certainly. Even if you are using a VPN (Virtual Private Network) to connect to your employer's network, your device will still be visible within the home network, e.g. by the convenient media server NAS (Network Array Storage) which you use to view your photos and share them with friends via a link or web browser. The same goes for the TV box and your TV. None of this is a problem as long as the various components are secure and protected against external access.
But, can you say for certain that all the individual components are secure and that you have them all under control? If not, you need to configure your device (or have it configured) so that it can protect itself to the maximum extent possible and that it complies with your company's security guidelines, for example:
These examples show that when you are working on a networked computer, you should be prepared for all eventualities and never blindly trust anyone – not even your home network. This is where Zero Trust comes in to play!
Trust is the basis for a successful collaboration, right? But hold on – trust can be exploited. Have you already heard about cyber attacks that exploit the willingness of employees to help out, for example, phishing? One response to this is the “Zero Trust Model”. In this model, the assumption is that trust is a risk, so according to Zero Trust, nothing can be trusted, both outside and even inside the company. Instead, every single access to the company system needs to be checked for its trustworthiness. Blind trust in “resources” such as hardware, data sources and services is a vulnerability. The following points demonstrate why Zero Trust is so important:
Consequently, no users, devices, services or configurations can be intrinsically trusted. Every device must be authenticated before it can be allowed to access a resource.
The principles described above may sound reasonable. But you are probably asking yourself how to implement Zero Trust in practice. Based on NIST (National Institute of Standards and Technology) according to the draft “Zero Trust Architecture” these are the important points:
The concept of Zero Trust is mirrored by the architecture derived from it. The PEP (Policy Enforcement Point) forces all resources to be authenticated by a trusted source – the PDP (Policy Decision Point). Possible policies are:
Figure: Elements of a Zero Trust system. In this illustration, the policy decision is divided into the policy engine and the policy administrator. (Source: Draft NIST Special Publication 800-207 “Zero Trust architecture”).
Various tools are available to implement these Zero Trust principles in IT systems:
The image of the castle with the moat and the drawbridge, the inner and outer fortifications and then the tower, has become ingrained in the security industry, and it implies that building the highest possible protective walls is the best means of protection.
The Zero Trust model challenges this concept because resources are no longer just located within the castle. Maybe the more accurate model is the image of an agile, armoured vehicle. It could be inside the castle, but it doesn't have to be.
However, anyone who thinks that the analogy of a moat and walls as security “defense in depth” is obsolete, as this could be interpreted to some extent, is mistaken. Defence in depth is a useful, important add-on in achieving maximum security when used together with Zero Trust.
Zero Trust is not rocket science, but it is complex enough for people to be easily overwhelmed. Still, sooner or later you will not be able to avoid implementing this model. But how?
Our cyber security experts have the knowledge and experience you need to advise you on all aspects of Zero Trust architecture – from strategy to implementation, including the right products. We look forward to hearing from you!