Augmenting Zero Trust Architecture To Endpoints Us
Augmenting Zero Trust Architecture To Endpoints Us
Abstract—With the purpose of defending against lateral challenges, as well as provide ideas and research directions to
movement in today’s borderless networks, Zero Trust tackle these problems.
Architecture (ZTA) adoption is gaining momentum.
Considering a full scale ZTA implementation, it is unlikely that A. The problem with traditional perimeter-based
adversaries will be able to spread through the network starting architectures
from a compromised endpoint. However, the already In the traditional perimeter-based security model, we
authenticated and authorised session of the compromised usually assume that the organisation resources and assets
endpoint can be leveraged to perform limited, though malicious
inside the perimeter are benign and trusted. Perimeters are
activities, ultimately rendering the endpoints the Achilles heel of
ZTA. To effectively detect such attacks, distributed usually protected by security measures such as firewalls or
collaborative intrusion detection systems with attack scenario- intrusion detection systems. This model seems to be less
based approach have been developed. Nonetheless, Advanced effective in the world of cloud computing and remote
Persistent Threats (APTs) have demonstrated their ability to working, as indicated by several cyber-attacks (e.g., [1], [2]
bypass this approach with high success ratio. As a result, [3] [4] [5]) targeted employees working remotely.
adversaries can pass undetected or potentially alter the Trust is the fundamental principle that a traditional
detection logging mechanisms to achieve a stealthy presence. perimeter-based security model relies on. The employee’s or
Recently, blockchain technology has demonstrated solid use collaborators’ devices and organisation assets (i.e., endpoints)
cases in the cyber security domain. Motivated by the can be trusted by default regardless of their condition. Once
convergence of ZTA and blockchain-based intrusion detection the attackers managed to take control over any of these
and prevention, in this paper, we examine how ZTA can be endpoints, they get inside the perimeter and gain access to
augmented onto endpoints. Namely, we perform a systematic
further sensitive information and assets. In addition, in the
review of ZTA models, real-world architectures with the focus
perimeter-based security model, organisation would not be
on endpoints, and blockchain-based intrusion detection systems.
We discuss the potential of blockchain’s immutability fortifying able to protect their assets managed by a third-party cloud
the detection process, and the identified open challenges as well service provider.
as the possible solutions and future directions. Firewalls, antivirus technologies, intrusion detection and
prevention system (IDS/IPS), Web App Firewalls (WAFs), in
Keywords — Zero trust architecture, blockchain, distributed other words, the big stone walls and armoured front doors are
ledger technology, collaborative intrusion detection, borderless not enough to keep modern IT and Operational Technology
networks. (OT) environments safe [1]. Perimeter-based security was the
main concept adopted by multiple companies, especially when
I. INTRODUCTION their data resided in on-premises data centres. The traditional
With the revolution of cloud computing and the cloud- defensive model founded on internal and external disparity is
based services, most resources and data of organisations or becoming obsolete [2], while at the same time the threat
businesses are no longer stored on premises. Moreover, landscape is dramatically evolving [3], ultimately leading into
pandemics like COVID-19 have significantly changed the the fall of perimeter-based security architecture.
work pattern, where most employees and businesses had to B. Zero Trust Architecture (ZTA) as a promising
switch to working from home. Homeworking (and remote
solution
working) open organisations up to new and serious security
risks, as many “untrained” employees connect to the work IT To cope with today’s complex network infrastructures and
systems with their own devices. The examples of cloud the current and advancing threat landscape, a new security
computing and remote working mean that businesses have to architecture is needed. ZTA has emerged by establishing a
expand their digital perimeter and perimeter-based security borderless digital identity-based perimeter, where data are on
and adapt to the new trends. the epicentre of the security architecture, assume breach
mindset is dominating the threat model, whereas also leading
In this paper, we highlight the problems of perimeter- the access control landscape, operations, hosting
based architecture, and discuss the concept of zero trust environments, endpoints and inter-connecting infrastructures.
architecture as a promising approach to tackle these problems. Nonetheless, ZTA remains less investigated and far less
We start by reviewing the core tenets and requirements of zero implemented for the time being. ZTA reassesses and
trust and in continuation, categorise existing zero trust reconsiders the traditional perimeter-based architecture and
implementations. Finally, we discuss the open questions and fosters a new security architecture whereby default, any
device, system, user or application should not be inherently
1
Forbes, Blockchain 50,
https://www.forbes.com/sites/michaeldelcastillo/2020/02/19/blockchain-50/
(accessed March 2021)
Centralization Decentralized Partially Centralized
Centralized
2) The consensus mechanisms: Assuming a blockchain
Double Possible Difficult N/A
enabled IDS, where multiple nodes, acting as peers, are Spending
spread throughout the network for monitoring, gathering and Attack
data correlation purposes they have to reach consensus Scalability Not Scalable Scalable Scalable
Memory Significant due Significant due Less than PoW
somehow. There must be an effective, practical, dependable, Requirement to public to public or PoS
efficient, continuous and secure mechanism to guarantee that ledger ledger
each and every single event and alert are received and sent Security Attack with Attack with May have a
respectively, as well as are real and unaltered while all peer 51% is 51% not single point of
possible possible failure
members concur to the status of the ledger. That said, there
are several consensus mechanisms providing such
capabilities each one with their different attributes [64]. 3) Related works on blockchain enabled IDSs:
a) Proof of Work (PoW): This serves as the most A universal architecture that incorporates CIDS with
popular consensus protocol, broadly used in cryptocurrencies permissioned blockchain has been described by Alexopoulos
and was first introduced in Bitcoin. PoW introduces the roles et al. [65], together with a design decisions analysis process
of the miners, those are responsible to solve cryptographic required when implementing such architecture. In this
puzzles while competing each other for a reward. However, architecture, a set of intrusion related alerts are defined as
PoW is probably not suitable for blockchain enabled IDS transactions within the blockchain. Then, utilising the
(within a private enterprise environment) as the concept of consensus protocol, all collaborating IDS nodes can verify
rewarded miners would introduce huge security gaps and the validity of the transactions prior conveying them into a
trust loopholes in the system. block. Eventually, the stored set of alerts shall be tamperproof
b) Proof of Stake (PoS): In this case, there is no within the blockchain. However, neither implementations
competition between the miners. Instead, PoS relies on the details are provided in their paper nor relevant results, hence,
validators, who are pseudo-randomly selected to validate a the idea remains explicitly theoretical. Similar work at a
block. In addition, it introduces the so-called stake tokens, theoretical level was published by Weizhi Meng et al. [66],
where in order to participate in this sequence, the validator where they studied upon data and trust management
enrols by staking some of his/her own tokens. Therefore, challenges on current IDS architectures. Afterwards, the
participants are rewarded based on the number of staked authors delivered the first review corresponding to the
tokens. Considering the blockchain based IDS use case, such intersection of intrusion detection systems and blockchain
mechanism would create a bottleneck as participants with technology, while also outlined the prospective application of
high amount of tokens staked have automatically better such collaboration. One of the key conclusions they made
chances of being elected for validation, which in turn creates was that blockchain technology can greatly assist in
a security risk when we talk about events, rules and alerts of enhancing an intrusion detection system’s core tasks such as,
an IDS. trust computation, exchange of alerts and data sharing.
c) Practical Byzantine Fault Tolerance (PBFT): In A step further in detecting adversaries via blockchain
PBFT, a predefined group of individuals act as validators. enabled cyber defence capabilities was performed by Li et al.
Participants have to reach consensus when a new event [67]. They studied specifically the integrity property in CIDS,
occurs while at the same time, they have to verify that no data by considering a highly likely scenario which we often
has been modified during the event transmission. If 2/3 of the encounter nowadays, namely, insider attacks such as a
participants reach consensus, then the decision is considered malicious node generating forged signatures and then sharing
final. it throughout peers. If that scenario becomes a reality,
d) Proof of Burn (PoB) & Proof of Capacity (PoC): intruders could potentially remain undetected, which would
Similar to the above-mentioned mechanisms PoB & PoC are greatly affect the effectiveness of a CIDS. In addition, the
operating under a similar scheme, they are mining and reward authors utilised the blockchain technology to solve the
based mechanisms which are an inherent disadvantage when subject issue in a verifiable manner, and evaluated the results
it comes to enterprise grade adoption for the use case of a via a so-called CBSigIDS development, a generic framework
blockchain enabled IDS, due to confidentiality and integrity
reasons [64].
Finally, to summarise this section, a comparative
evaluation of the most widely implemented consensus
mechanisms can be found in in Table 4 (Hazari et al. [64]).
On the other hand, a more practical approach was One of the core principles of ZTA, namely, “never trust
proposed by Golomb et al. [68], namely, the collaborative IoT but verify”, seems to match greatly with blockchains’
anomaly detection (CIoTA) framework. This is a lightweight inherent attribution where every transaction must be
framework that leverages blockchain technology to validated, consensus must be achieved at all times, while
accomplish collaborative and distributed anomaly detection. ledger’s immutability seals integrity.
In this framework, Blockchain is being utilised to
C. ZTA and Decentralised Blockchain-based IDS
incrementally feed an anomaly detection model and establish
convergence
consensus amid IoT devices. Eventually, the authors created
their own distributed IoT simulation platform consisting of In this section, we build upon the ZTA core principle of
48 Raspberry Pi’s and evaluated and demonstrated CIoTA’s assuming breach (see section II.C) to discuss how
ability to enhance security via blockchain. Blockchain-based IDS can be employed. For this discussion,
we use an example of a ZTA enabled notional bank network,
Conclusively, we can say that the previous works where we assume that a single endpoint has been
validate, mainly at the theoretical level, the potential of compromised via a spear phishing attack. As per our review
blockchain enhancing intrusion detection. There is, however, (see section II), and the abovementioned assumption, the
a practical demonstration of the above conclusion performed lateral movement is highly unlikely once ZTA is in full force
by Golomb et al. [68] with CIoTA, although it is focus and [69], adhering to all principles and all mandated controls in
scope is limited on IoT. Moreover, an IoT network is different place. However, the endpoint itself remains compromised,
from an enterprise network in the sense that it provides less together with the already authenticated and authorised
control maturity compared to the current applicable control sessions of the subject user in the endpoint. Moreover, the
frameworks and standards. Besides the great potential of adversaries can abuse the authenticated and authorised
using blockchains in intrusion detection (and prevention), sessions of the user and extend their attack to the systems in
there are probably other advantages that require further reach of the subject user.
research. For instance, a blockchain enabled IDS can be a
Distributed collaborative intrusion detection systems as
reviewed in section A, would be able to detect such attack via
a plethora of methodologies. Specifically, attack scenario- This is very different from ZTA and blockchain, where
based approach for alert correlation when utilised by DCIDs both run on a borderless and decentralised manner
is an effective and efficient approach for adversary detection. respectively. Since there is no perimeter on both ZTA and
A major shortcoming can be identified, however, with this blockchain, security comes from efficient and effective
approach. In the context of ZTA and APTs, (1) the adversaries management of trust. In fact, for blockchain, security comes
characteristically use legitimate tools in malicious manner, from the incredible amount of repetition because every node
and (2) they also utilise advanced evasive techniques against is being asked to keep the same copy of the ledger and
the standard controls (e.g., signature based / heuristic-based periodically reach majority consensus on what the proper data
anti-virus etc.) Therefore, the attack scenarios can fluctuate in that ledger should be. As such, the amount of work that an
greatly. Until the attack scenario-based approach eventually attacker would have to do is practically impossible, if
constructs the relevant and matching scenario, adversaries adversaries wanted to change, hack, or alter the ledger. That
probably have already established stealthy foothold into the said, it seems that blockchain and ZTA can complement each
network, deeming the detection process ineffective, again, in other in various use cases, since both share at least some
a ZTA context. In addition, the integrity of DCIDs nodes is fundamental principles.
questionable as per the literature review in certain scenarios.
Our assumption of an APT compromising an endpoint, is Determined attackers, also known as APTs, with the
subject to the same scenario, since a determined adversary necessary knowledge and resources have demonstrated their
would likely try to influence the integrity of a node and/or ability to compromise various endpoints with ease, and plant
tamper with logs and audit trails to render the attack invisible. malware to establish foothold into corporate networks. The
different ZTA deployment models (see section II.E and
Blockchain based intrusion detection as reviewed in implementations (see section III) are a great instrument in the
section B, greatly increases the integrity of the audit trail and hands of defenders, in their effort to prevent lateral
log files, as well as the overall integrity of the information movement. The result is a highly secure, trust-less and
stored in the blocks themselves. Additionally, blockchain borderless architecture with fine grained identity-based
could potentially enhance the efficiency of intrusion detection
access controls always seeking to verify. However, the
by extending the immutability aspect on the context of each
and every single identity. Specifically, zero trust security endpoints are proven to be the Achilles heel of ZTA.
health checks can be used to create the so-called endpoint Adversaries can potentially tamper with ZTA’s security
context. This context, then, could be further fortified by the health checks once an endpoint is compromised, therefore
distributed ledger technology to achieve integrity. ZTA, leveraging the already authenticated and authorised user’s
DCIDS and the blockchain technology seem to have a great session.
intersection and many potential use cases. In fact, some use Blockchain technology can enhance ZTA
cases could even be extended beyond detection, to implement implementations in several use cases. As described in section
blockchain based prevention capabilities.
V.C, a blockchain-based intrusion detection system could
VI. SUMMARY AND DISCUSSION help in amplifying the detection capability. At the same time,
it is possible to fortify the backend storage of relevant logs &
As we can see, ZTA and blockchain take a different
audit trails in the blockchain, providing immutability.
approach on trust management, security and architecture
Blockchain based authentication could also be used to
overall, in contrast to traditional, perimeter-based approach.
Table 5 shows the previously mentioned elements intersection enhance remote working. For instance, a blockchain based
in ZTA and blockchain, in contradiction to the traditional layer could be added on top of a software defined perimeter
perimeter-based approach. (SDP) to strengthen the endpoints integrity. Enhancing the
prevention capability with blockchain is of equal, if not more,
Table 5 - ZTA & Blockchain Intersection elements interest. Combining a blockchain-based intrusion detection
Traditional Zero Trust Blockchain
and prevention system would ultimately augment ZTA onto
Perimeter-Based Architecture the endpoints, significantly enhancing detective and
Architecture
preventive functions.
Overall Centralized Decentralized Decentralized
Approach