ZERO-TRUST ARCHITECHTURE IN CYBER SECURITY

uu232003 192 views 19 slides Aug 09, 2024
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

Information about Zero trust Architechture


Slide Content

ZERO TRUST ARCHITECHTURE “TRUST ITSELF IS A VULNERABILITY ” PREPARED BY GOWRISHANKAR T O

TABLE OF CONTENTS INRODUCTION HISTORY CASTLE AND MOAT MODEL ZERO TRUST ARCHITECTURE WHY SHOULD COMPANIES ADOPT ZERO TRUST IN THEIR ENVIRONMENT PROS AND CONS OF ZERO TRUST ARCHITECHTURE CONCLUSION 2

INTRODUCTION Zero Trust Architecture (ZTA) is a cybersecurity concept that doesn't automatically trust anything inside or outside the network perimeter. It verifies the identity and security of users and devices before granting access to resources, regardless of their location . A zero-trust architecture enables organizations to prioritize access and restrictions . The goal is to implement a zero-trust policy across all traffic, to ensure no user, device, or system can put the network at risk. 3

HISTORY Zero Trust Architecture (ZTA) originated in 2010, proposed by Forrester Research's John Kindervag as a security model that assumes no trust by default, regardless of location or network segment . Leading technology companies like Google and Microsoft embraced Zero Trust principles, with Google's BeyondCorp framework becoming a notable example of ZTA implementation NIST published Special Publication 800-207 in 2020, formalizing guidance on Zero Trust Architecture implementation, contributing to its standardization ZTA gained widespread adoption across industries due to its effectiveness in mitigating cyber threats, especially with the rise of remote work and cloud services 4

CASTLE AND MOAT MODEL The castle-and-moat model is   a traditional cybersecurity model that involves building a strong outer wall or moat around a castle to make it difficult for intruders to enter 5

DRAWBACKES OF CASTLE AND MOAT MODEL ASSUMPTION OF PERIMETER SECURITY LIMITED PROTECTION AGAINST INSIDER THREATS INABILITY TO DETECT INSIDER THREATS COMPLEXITY AND MAINTENANCE INFLEXIBILITY IN REMOTE WORK ENVIRONMENTS FAILURE TO ADAPT TO MODERN THREATS 6

ZERO TRUST ARCHITECHTURE What is zero trust architecture ? Zero trust is a cybersecurity strategy wherein security policy is applied based on context established through least-privileged access controls and strict user authentication—not assumed trust. A well-tuned zero trust architecture leads to simpler network infrastructure, a better user experience, and improved cyber threat defense . “ NEVER TRUST ALWAYS VERIFY ” 7

ZERO TRUST ARCHITECHTURE CREDIT : MICROSOFT 8

TECHNOLOGYS USED IN ZTA IDENTITY AND ACCESS MANAGEMENT(IAM) MULTI – FACTOR AUTHENTICATION NEXT – GENERATION ENDPOINT SECURITY TECHNOLOGY IDENTITY PROTECTION 9

PRINCIPLES OF ZTA VERIFY IDENTITY LEAST PRIVILAGE ACCSES MICRO - SEGMENTATION CONTINUOUS MANAGMENT POLICY BASED ACCSES CONTROL 10

LOGICAL COMPONENTS OF ZTA POLICY ENGINE (PE ) POLICY ADMINISTRATOR (PA) POLICY ENFORCEMENT POINT (PEP) CREDIT : NIST 11

MAJOR LOGICAL COMPONENTS OF ZTA POLICY ENGINE (PE ) : Makes access decisions for resources Uses enterprise policy and external input Utilizes trust algorithm. Paired with policy administrator Logs and executes decisions POLICY ADMINISTRATOR (PA) Controls communication paths Generates authentication tokens Relies on PE's decision Configures PEP Communicates via control plane 12 POLICY ENFORCEMENT POINT (PEP ) Manages connections Communicates with PA Controls access Can be single or divided Situated within trust zone

DEPLOYMENT OF ZTA IDENTIFYING THE PROTECT SURFACE CREATING A MICRO PERIMETER MONITORING USERS AND DEVICES ACCSES POLICIES CONFIGURATION 13

WHY SHOULD COMPANIES ADOPT ZERO TRUST IN THEIR ENVIRONMENT CREDIT : https://www.techtarget.com/ CREDIT : IMR (INDIAL MILITERY REVIEW) 14

WHY SHOULD COMPANIES ADOPT ZERO TRUST IN THEIR ENVIRONMENT ADVANCED THREAT LANDSCAPE DATA PROTECTION AND PRIVACY MOBILE WORKFORCE AND CLOUD ADOPTION ZERO TRUST PRINCIPLES ALIGN WITH MODERN IT ARCHITECTURE MINIMIZE ATTACK SURFACE COMPLIANCE REQUIREMENTS BUSINESS CONTINUITY AND RESILIENCE 15

PROS OF ZERO TRUST ARCHITECHTURE ENHANCED SECURITY GRANULAR ACCESS CONTROLS REDUCED ATTACK SURFACE ADAPTABILITY COMPLIANCE 16

CONS OF ZERO TRUST ARCHITECHTURE COMPLEXITY COST USER EXPERIENCE RESISTANCE TO CHANGE INTEGRATION CHALLENGES 17

CONCLUSION By continuously verifying and authenticating every access attempt, Zero Trust Architecture helps organizations better defend against increasingly sophisticated cyber threats and mitigate the risk of data breaches As technology continues to evolve and cyber threats become more advanced, Zero Trust Architecture will remain a critical component of modern cybersecurity strategies, enabling organizations to stay resilient and secure in an ever-changing threat landscape . 18

19 THANK YOU