Unpacking Zero Trust - Part 2
Extending Zero Trust to Applications and Data
While most organizations excel in implementing Zero Trust principles for?Identity,?Network, and?Device, the pillars of?Applications?and?Data?are often more complex and harder to address. Yet, these two pillars are where the most critical assets reside, and they are often the ultimate targets of cyberattacks. This article explores how organizations can extend Zero Trust principles to these overlooked but essential pillars.
The Application Pillar: Moving Beyond Network-Level Control
Applications are the gateway to sensitive business functions and data, yet many organizations ignore application security and let it rest 100% with the Business Units. It can be argued that application security belongs with the business, however, it creates isolated security practices and creates a potentially unyielding governance process, completely de-centralized.
Organizations, that attempt to use Zero Trust Network Access (ZTNA) as an step forward, this is usually managed and implemented by the security or network security organization and it primarily governs access at the network layer, this does not necessarily include the business security needs. True Zero Trust for applications requires granular control at the application level.
Challenges in Application Security
Securing applications in today’s digital environment is no small task. Organizations manage a mix of custom-built, off-the-shelf, and cloud-based applications, each with its own unique access and security requirements. This complexity creates several challenges:
A Real-World Example Imagine a healthcare organization where employees access an Electronic Medical Record (EMR) system. A Zero Trust implementation might enforce the following:
The true value of Zero Trust in these examples lies in its ability to externalize policies from the applications themselves. Whether the policies are based on roles, attributes, or purely contextual rules, they can be applied consistently across multiple applications. Moreover, these policies are designed to evolve over time while maintaining a foundation of strong governance.
The Data Pillar: Protecting the Crown Jewels
If applications are the gateway, data is the ultimate asset that Zero Trust aims to protect. Yet, protecting data is significantly more challenging because it requires organizations to understand, classify, and control access to their most valuable information.
Challenges in Data Security
Securing sensitive data has never been more challenging as it spreads across on-premises systems, cloud platforms, and SaaS applications, creating significant gaps in visibility and control. Many organizations struggle to classify data based on its sensitivity or regulatory requirements, making it difficult to enforce effective security policies. The following outlines some of these challenges:
领英推荐
What Zero Trust for Data Looks Like To extend Zero Trust principles to data, organizations need to focus on three core strategies:
3. Real-Time Monitoring and Encryption: Implement tools to monitor data access in real-time, flagging suspicious activity such as unauthorized downloads or attempts to access sensitive files outside business hours. Additionally, data should always be encrypted both at rest and in transit.
A Real-World Example Consider a financial institution that stores sensitive customer data, such as Social Security numbers, in a cloud-based database. With Zero Trust:
Enabling Technologies for Applications and Data
Why These Pillars Are Critical
While Identity, Network, and Device are foundational, Applications and Data are where the real value lies. Without extending Zero Trust principles to these pillars, organizations risk leaving their most critical assets exposed. These pillars represent the end goals of cyberattacks, and as such, they require the highest levels of protection.
While these may seem like fundamental elements of cybersecurity programs and the technologies supporting applications and data, the real value lies in integrating them with identity providers, network security solutions, and device context systems. It’s this seamless integration that drives meaningful impact and enhances overall security.
A Call to Action
To extend Zero Trust to Applications and Data, ask yourself:
Stay tuned as we continue this journey toward a complete Zero Trust strategy. Keeping in mind, it is NOT ONE PILLAR that will make this successful! #ZeroTrust #DataSecurity #ApplicationSecurity #CyberSecurity #DataGovernance
Open source zero trust networking
1 个月Another aspect for app-centric zero trust is to embed a zero trust connectivity overlay, so that you make IP/network attacks impossible against the app - as it has no listening ports on the WAN, LAN or even host OS network. This massively reduces the attack surface of our apps, while providing huge simplifications for ops. As you say, this is externalised from the app, with ABAC, policies, etc. An example of this is NetFoundry, and the open source technology is it built on, OpenZiti - https://openziti.io/. I know of at least 1 other OSS project going in this direction.