Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management

    Identity-Based Zero Trust is More Than a Buzzword

    One expert argues that a better form for security would apply the concept of Zero Trust to user identity, instead of to system resources.

    By
    eWEEK EDITORS
    -
    July 27, 2021
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Zero Trust is being invoked frequently by security professionals, almost as a cure-all for all those things that keep them up at night. In fact, the number of organizations using Zero Trust initiatives has more than tripled, from 16% three years ago to 60% today.

      But Zero Trust security can be a headache for the staff in charge of your network infrastructure, and even create vulnerabilities, as your users try to finesse their own ways around those pain points in their workday.

      A better form for security would apply the same concept of Zero Trust — never assuming the user is who they say they are — to user identity, instead of to system resources. Let’s explore this further.

      The Zero Trust Model

      Zero Trust security is typically implemented at the network level, to prevent a hacker from using a compromised account to move laterally within the environment or spread malware. It works by breaking down the network into smaller segments and authenticating users by checking their identity and access privileges before they enter each one.

      The security benefits of this network approach are clear, however it requires a lot of work on the network infrastructure to control access to every segment. Upon initial implementation, the entire network infrastructure has to be rebuilt for this segmentation. Since most enterprises have complex information infrastructures, including on-premise and cloud-based resources, there’s a lot of work involved in deploying Zero Trust network security.

      Since network-based Zero Trust is built on the premise of keeping attackers from entering a network segment, if attackers manage to bypass a particular segment’s security controls they are free to move laterally and access any resource within it. An approach that secures each single resource rather than just the segment’s gateway would better align with the concept of defense-in-depth and will be a much better choice.

      Identity-Based Zero Trust

      Enter identity-based Zero-Trust security, which focuses security on the identity layer, instead of the network layer. This architecture applies authentication to the very identity of the user, instead of the user’s connection, as in network-based Zero Trust. According to the National Institute of Standards and Technology (NIST), which recently published its own Zero Trust bible, identity-based Zero Trust is a good approach for enterprises that use cloud-based apps and services which don’t allow customers to bring their own security tools.

      For example, in network-based Zero Trust, an authenticated VPN user is trusted and intrinsically allowed to access resources such as file servers or databases in the environment. In an identity-based approach, an authenticated VPN user is not automatically “trusted” and must authenticate every time they try to access a resource. It’s like the bartender checking your ID every time you order a drink, after you already showed ID to get into the club.

      Identity-based Zero Trust continuously monitors all access requests made by all users to any resource in the system, whether on-premise or on the cloud, and builds a thorough audit trail for compliance and policy enforcement. Every time an individual user – human or machine – tries to access a resource, a risk analysis is performed based on the user’s behavior during the session and other contextual parameters.

      Based on this assessment, an identity-based Zero Trust architecture enforces the organization’s access policy in real time, either requiring some form of additional multi-factor authentication before allowing access, or simply denying user access.

      For example, if a user attempts to access a SaaS app, they are normally vetted by the cloud provider’s identity and access management (IAM) system, and allowed access to all the company’s SaaS apps. Identity-based Zero Trust validates users every time they attempt to access a new app on that cloud, continuing the audit trail.

      Identity-based Zero Trust provides several advantages that ease implementation and management, and increase security. There is no need to rebuild and replace anything in your system’s infrastructure. This means no downtime and lower costs.

      Once deployed, identity-based Zero Trust provides greater visibility into risk, by performing risk analysis at every resource access attempt, rather than at the network segment level. And most importantly, by carrying out security checks at every resource access, it improves the detection of anomalies and threats, improving the organization’s security posture.

      Partial Zero Trust is not Zero Trust. To provide effective protection, a Zero Trust architecture needs to span all resources both on-premises and in the cloud, as well as all access requests by machine and human accounts. Applying Zero Trust to identities makes this possible.

      ABOUT THE AUTHOR: 

      Yaron Kassner is CTO and co-founder of Silverfort

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      10 Best Artificial Intelligence (AI) 3D Generators

      Aminu Abdullahi - November 17, 2023 0
      AI 3D Generators are powerful tools for creating 3D models and animations. Discover the 10 best AI 3D Generators for 2023 and explore their features.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×