Embracing A Zero Trust Security Model
Embracing A Zero Trust Security Model
!
layering security tools like moats and walls around a castle. This concept made
sense when cyberthreats only emerged from outside, and assets lived on-
premises.
Today’s new landscape — cloud, remote workforces and mobile devices — fails
to conform to traditional security strategies. Instead, it opens up the attack
surface by allowing data and workloads to live, operate and be accessed
outside traditional means.
This is where adopting a zero trust security strategy comes into play.
In this short guide, we’ll explore some of the driving forces that necessitate
a zero trust strategy, as well as what that strategy entails and how it can be
implemented.
When organizations move to the cloud, user access moves outside their
traditional perimeter, creating new challenges for visibility, control and
securing data.
With this mindset, every user, device and service that requires access to
an organization’s network is considered hostile — even if it’s a known and
approved entity.
Zero trust enhances security posture by eliminating the sole reliance on This shows how leveraging multiple factors (in this case, the combined scores of
perimeter-based protection. In effect, organizations decrease their reliance on the user, device and resource) allows the agency to reduce risk to the enterprise
network security — instead focusing on securing users, assets and resources. resource dynamically. A zero trust system needs the ability to factor in changing
conditions for continuous evaluation.
Protection and authentication need to be continually applied at the A recent Forrester Report found that we live in a time where organizations
device and user level for each transaction, ensuring continuous have “to assume you have already been compromised; you simply don’t know
and adaptive authorization. it yet. That is the necessary mindset in today’s hostile environment. ‘Trust but
verify’ leaves you flatfooted and sets you up for crisis management. Zero trust
may seem stark, but it is the proactive, architectural approach to align with
This ensures a level of trust at each access point and removes some of the
mission priorities.”
anxiety around securing a remote office. It also reduces the threat of “data
leakage,” or employees accidentally losing sensitive company data downloaded
to personal devices.
Cloud
A simplified example of what this looks like in the real world is an employee
who is authorized to use an organization’s case management system from Wireless
Connection Home
a newly assigned device. The employee makes a request from that device
and is granted access. Public
On Site Kiosk
After some time, the employee downloads a driver from a website in an effort
to be helpful. Since the device is continuously monitored in a zero trust strategy,
the update is flagged. The addition of the unknown component has altered the
approved configuration and therefore the trust score of that device will
be updated.
Automation
Analytics
Network
Devices
Bringing data from across the organization delivers the holistic visibility —
including context — required to make informed access decisions. Risk scores
NIST similarly provides its own for entities requesting access can be dynamically calculated against a variety
guidelines for implementing a of conditions such as device, user credentials, behaviors, time of day and any
other attributes collected through continuous monitoring
successful zero trust strategy:
• All data sources and computing services need to be considered resources. Legacy Modern
• All communication needs to be secured regardless of where a network is.
Static, Perimeter-Based Protect Assets, Users, Resources
• Access to individual enterprise resources is granted on a per-session basis.
• Access to resources is determined by dynamic policy — including the Assumption of Compromise/
Implicit Trust Within Perimeter
observable state of client identity, application and the requesting asset — Continuous Evaluation
and may include other behavioral attributes.
Comply to Connect to Network Comply to Connect to Resource
• The enterprise ensures that all owned and associated devices are in the
most secure state possible and monitors assets accordingly.
Product/Tool Based “Agency-Wide” Approach
• All resource authentication and authorization are dynamic and strictly
enforced before access is allowed.
The Splunk Data-to-Everything Platform offers a continuous monitoring and Splunk specifically maps to the zero trust model in three ways:
analytics solution for chief information security officers (CISOs) and security
professionals who need to ensure secure access to their data and applications 1. Splunk increases confidence and trust in access decisions to enterprise
in the modern, perimeter-less enterprise. resources by continuously monitoring and delivering visibility across users,
assets and services.
The platform helps drive confidence and ongoing trust in access decisions, 2. Splunk delivers full-stack visibility into service health, component
while ensuring component performance, policy adherence and availability relationships and infrastructure, ensuring performance and availability, and
across the zero trust ecosystem. predicting issues before they happen with machine learning.
The Splunk Platform helps organizations ingest data from almost any source, 3. Splunk helps reduce manual effort, analyst fatigue and costs by enforcing
monitor its infrastructure end-to-end, and optimize and increase effectiveness zero trust policies through task automation and workflow orchestration
of the zero trust ecosystem.
Devices
Laptops, Mobile,
Configurations, Anomalies
User and Entity Behavior
Analytics (UEBA)
Users
Entities
Continuous Monitoring
Usage, Experience,
Performance, Quality
Real-Time Visibilitiy
Workloads/Applications
Laptops, Mobile,
Configurations, Anomalies Behavior Analytics
Performance, Identity
IoT/OT/Machines Automation/Orchestration
Identity, Utilization,
Behavior, Configurations
Compliance
Cloud
Availability, Performance,
Behavior Service Insights
IT Service Intelligence
(ITSI)
Threat Intelligence
Intel
Vulnerabilities, Threats,
TTPs, IOs Saas Cloud
Organizations can rely on the Splunk Platform for rich, contextual details on Additionally, organizations can gain real-time visibility across their network,
any user, asset or service requesting access to enterprise resources, at endpoints and application stack to ensure compliance, faster audits and
intervals dictated by the org’s policies, for fast and informed decisions. orchestrate any remediations of configuration drifts. They can continuously
monitor components of the zero-trust infrastructure to ensure assets remain
Event management is combined with advanced security and behavior analytics in the most secure state possible.
for a sophisticated set of capabilities that are further augmented with machine
learning. This enables the policy engine to determine the trustworthiness and
risk posed by the entity requesting access to enterprise data at any given time
in a dynamically adaptive manner.
Splunk Enterprise Security (ES) is an industry-leading SIEM solution Splunk UBA extends the power of Splunk ES by allowing organizations to
that delivers an end-to-end view of an organization’s security posture with act on high-fidelity threats, while optimizing threat detection and enabling
actionable intelligence to prioritize incidents and respond appropriately. targeted incident response. It delivers dynamic risk evaluation capabilities
by continuously monitoring access control and user behaviors — internal
Splunk ES has comprehensive security-specific views of data, which helps and external — to detect any abnormal or unauthorized activities. It can
security teams detect cyberthreats faster and optimize incident response. automatically stitch together multiple anomalies across multiple entities —
It also provides rapid investigation capabilities, making it possible to detect users, accounts, devices and applications — into a single threat, simplifying
malicious activities or breaches, and investigate the scope of a threat or an analysis and accelerating actions.
Search and Dashboards Incident and Monitoring Threat Security Automation Discover Detect
Investigate and Reports Breach and Alerting Detection Operations and Anomalous Unknown
Response Orchestration Behavior Threats
ITSI correlates and applies machine learning to metric, log and trace data,
and integrates monitoring, event management and incident response into
one platform. ITSI’s alert management and analytic capabilities provide near
real-time, predictive performance dashboards to monitor service health. This
can integrate with IT Service Management (ITSM) and orchestration tools like
VictorOps and Splunk Phantom, so teams can monitor, detect, respond and
resolve incidents all from one place.
Splunk, Splunk>, Data-to-Everything, D2E and Turn Data Into Doing are trademarks and registered trademarks of
Splunk Inc. in the United States and other countries. All other brand names, product names or trademarks belong
to their respective owners. © 2021 Splunk Inc. All rights reserved.