Zero trust means zero without identity management
In zero-trust land, we’re assumed to be an imposter by each and every resource we interact with. A network credential is no longer sufficient.In the old days, we would prove our identity to the company network when we logged in. Then we would be trusted within the network. But now we can't be trusted in the network because an adversary can get in basically anywhere, so we've got to validate identity all over the place.I think of it as moving from a trusted corporate network to a model more like the internet. Systems are isolated, data is segmented, the network is segmented, nothing can be accessed or shared without appropriate permissions at every stage.If we want to perform a relatively complex task online, like doing taxes, we’re going to end up logging into maybe several systems doing that (such as online banking, an accountant portal, HMRC, an authenticator). The internet already operates close to zero trust.
Three challenges with zero trust
The benefits of zero trust in a business seem obvious – in theory it makes it harder for adversaries to gain access, move laterally and do high impact damage. In practice it is proving hard to achieve. The stories we hear from the coalface are that, whilst it can be a useful banner to drive change, it’s proving challenging to make great leaps towards this future vision.One of the key challenges in achieving the zero trust holy grail is in identity management. At every interaction, a person (or system) must be authenticated to check they should have access to the service or data in question.This poses three key problems:- We need close to perfect understanding of identity for people and machines. That means understanding what every identity has access to, the level of privilege it has, and the people or systems which can use that identity.
- Account compromise becomes the main threat vector, so we need to minimise the number of accounts and the overall level of privilege across all accounts.
- If users can’t seamlessly traverse systems, can’t access systems, can’t access data they need to do their work, the system has failed and the business suffers.