Zero Trust Maturity Model
Zero Trust Maturity Model
downloaded from
www.ministryofsecurity.co
Follow ministryofsecurity for
more such infosec content.
Abstract
In this document, we will share guiding principles for implementing a Zero Trust security model and a
maturity model to help assess your Zero Trust readiness and plan your own implementation journey. While
every organization is different and each journey will be unique, we hope the Microsoft Zero Trust Maturity
Model will expedite your progress.
Introduction
Cloud applications and the mobile workforce have redefined the security perimeter. Employees are bringing
their own devices and working remotely. Data is being accessed outside the corporate network and shared
with external collaborators such as partners and vendors. Corporate applications and data are moving from
on-premises to hybrid and cloud environments.
The new perimeter isn’t defined by the physical location(s) of the organization—it now extends to every
access point that hosts, stores, or accesses corporate resources and services. Interactions with corporate
resources and services now often bypass on-premises perimeter-based security models that rely on
network firewalls and VPNs. Organizations which rely solely on on-premises firewalls and VPNs lack the
visibility, solution integration and agility to deliver timely, end-to-end security coverage.
Today, organizations need a new security model that more effectively adapts to the complexity of the
modern environment, embraces the mobile workforce, and protects people, devices, applications, and data
wherever they are located. This is the core of Zero Trust.
Zero Trust overview
Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach
and verifies each request as though it originates from an uncontrolled network. Regardless of where the
request originates or what resource it accesses, Zero Trust teaches us to “never trust, always verify.”
In a Zero Trust model, every access request is strongly authenticated, authorized within policy constraints
and inspected for anomalies before granting access. Everything from the user’s identity to the application’s
hosting environment is used to prevent breach. We apply micro-segmentation and least privileged access
principles to minimize lateral movement. Finally, rich intelligence and analytics helps us identify what
happened, what was compromised, and how to prevent it from happening again.
Identities
Identities – whether they represent people, services, or IOT devices – define the Zero Trust control plane.
When an identity attempts to access a resource, we need to verify that identity with strong authentication,
ensure access is compliant and typical for that identity, and follows least privilege access principles.
Devices
Once an identity has been granted access to a resource, data can flow to a variety of different devices—from
IoT devices to smartphones, BYOD to partner managed devices, and on-premises workloads to cloud hosted
servers. This diversity creates a massive attack surface area, requiring we monitor and enforce device health
and compliance for secure access.
Applications
Applications and APIs provide the interface by which data is consumed. They may be legacy on-premises,
lift-and-shifted to cloud workloads, or modern SaaS applications. Controls and technologies should be
applied to discover Shadow IT, ensure appropriate in-app permissions, gate access based on real-time
analytics, monitor for abnormal behavior, control of user actions, and validate secure configuration options.
Data
Ultimately, security teams are focused on protecting data. Where possible, data should remain safe even if
it leaves the devices, apps, infrastructure, and networks the organization controls. Data should be classified,
labeled, and encrypted, and access restricted based on those attributes.
Infrastructure
Infrastructure (whether on-premises servers, cloud-based VMs, containers, or micro-services) represents a
critical threat vector. Assess for version, configuration, and JIT access to harden defense, use telemetry to
detect attacks and anomalies, and automatically block and flag risky behavior and take protective actions.
Networks
All data is ultimately accessed over network infrastructure. Networking controls can provide critical “in pipe”
controls to enhance visibility and help prevent attackers from moving laterally across the network.
Networks should be segmented (including deeper in-network micro segmentation) and real-time threat
protection, end-to-end encryption, monitoring, and analytics should be employed.
Zero Trust across the digital estate
In an optimal Zero Trust implementation, your digital estate is connected and able to provide the signal
needed to make informed access decisions using automated policy enforcement.
Let’s explore how the major components of the Zero Trust model all work together to deliver end-to-
end coverage.
Identities Data
Classify, Emails & documents
label, encrypt
Multi-factor
authentication
Apps
User/session risk
Adaptive SaaS Apps
Access
Containers
Serverless
Int. Sites
Threat
PaaS
IaaS
protection
Network
Devices Network delivery
Internal Micro-segmentation
Automation
Maturity
segmentation, and encryption are in place.
• Real-time analytics dynamically gate access to
applications, workloads, networks, and data.
model
• Automatic threat detection and response is
implemented.
• Data access decisions are governed by cloud
security policy engines and sharing is
secured with encryption and tracking.
On the next page you will find an expanded maturity model to help you assess your own Zero
Trust readiness across your user identities, devices, application, data, infrastructure, and networks.
Traditional
Devices are domain joined Devices are registered with Endpoint threat detection is used
and managed with cloud identity provider to monitor device risk
solutions like Group Policy
Object or Config Manager Access only granted to cloud Access control is gated on device
Devices managed & compliant devices risk for both corporate and BYO
Devices are required to be devices
DLP policies are enforced for
on network to access data BYO and corporate devices
On-premises apps are On-premises apps are All apps are available using least
accessed through internet-facing and cloud privilege access with continuous
physical networks or VPN apps are configured with SSO verification
Some critical cloud apps
Apps are accessible to users
Cloud Shadow IT risk is Dynamic control is in place for all
assessed; critical apps are apps with in-session monitoring
monitored and controlled and response
In closing
While a Zero Trust security model is most effective when integrated across the entire digital estate, most
organizations will need to take a phased approach that targets specific areas for change based on their
Zero Trust maturity, available resources, and priorities. It will be important to consider each investment
carefully and align them with current business needs. The first step of your journey does not have to be a
large lift and shift to cloud-based security tools. Many organizations will benefit greatly from utilizing
hybrid infrastructure that helps you use your existing investments and begin to realize the value of Zero
Trust initiatives more quickly.
Fortunately, each step forward will make a difference in reducing risk and returning trust in the entirety of
your digital estate.
Microsoft is currently on its own Zero Trust journey. Head over to our IT Showcase to learn more about how
we’ve approached our Zero Trust journey, our current progress, and upcoming milestones.