Zero Implicit Trust

Defense At the Perimeter

The King and Zero Implied Trust

In days of old, Kings understood, that if they were to remain Kings, that they needed a castle with high walls, a moat, and a draw bridge. The castle had to have space for the serfs to come to trade and feel safe. The start of Defense in Depth. Worked out well for awhile.

The high walls, moat, and a draw bridge worked out well until someone figured out, if they could lob a ball of fire over the high walls, the high walls meant little. The early start to malware.

The King Is No More

The consequences were inevitable. The King was no more. The result of thinking: that a defense on the perimeter would win the day.

Attack Timeline and Cost

Fire Balls to Ransomware

Fast forward a few centuries – fire balls to ransomware. The timeline is from an article posted by Cisco.

The timeline graphic clearly shows more and more successful attacks over a shorter time frame. What is missing?:

Let’s take a look at the cost, facts, and implications of cybercrime incidents as they unfolded over the past year. 

  • Cybercrime costs the global economy about 1 trillion — 50% more than that predicted in 2018. Also, it is more than 1% of the global GDP. 
  • The average cost of a data breach in 2020 was a whopping  $3.86 million. In 2021 it was $4.24 million.
  • A data breach compromising 1-10 million records costs $50 million on average, whereas one compromising 50 million records can cost as much as $392 million. “

Perhaps as interesting as the cost of successful cyber-attacks, is the success of prosecuting cyber-attacks or lack thereof:

“Not only is the current wave of cybercrime largely unseen, but the chances of being successfully investigated and prosecuted for a cyber-attack in the US are now estimated at 0.05%. This mirrors similar reports from around the world. This is for a crime type that is predicted to be costing the global economy $6 trillion by 2021. For violent crime, the equivalent chance is 46%. The global community needs to ask itself why this is happening, and what can be done to change it.”

Another interesting observation, for centuries the tactic for an attack has not changed. The predator — attacker–formulates a plan. Basic plan, apply pressure, enough pressure, to bring about behavior modification. The goal is to get the prey to open the door so that the predator can successfully attack, pillage resources, and leave. Perhaps the biggest change over centuries is that it is now much easier to get the prey to open the door than it was centuries ago. Hundreds of years ago, the attacker might have to burn down a castle. Today, all the attacker has to do is get the prey to click on a link.

Nist Zero Trust Architecture

NIST ZERO Trust Architecture

NIST has a number of papers on Zero Trust. This image shows an agnostic look at Zero Trust. For me, this picture is too general. It shows Policy implementation and enforcement as being at the center. It does not show any Policy Decision Points. I think of data as being the center of Zero Trust.

The NIST Risk Management Framework (RMF) and Cybersecurity Framework (CSF) from NIST provide guidance – a set of steps – that help get to Zero Trust.

Risk Management

NIST Risk Management Framework

Cybersecurity Framework

Cyber Security Framework

Azure Zero Trust

Azure Zero Trust

This image, from Microsoft, I think more clearly shows the relationships in a Zero Trust Architecture. The relations are shown by showing flow in Azure Services. In this image, policy enforcement is shown as the center controlling access to Azure Services. Shown are access to Threat Protection, Endpoints, Infrastructure, Networks, Apps, and Data controlled by policy enforcement. In the upper left is the Identity Service. Zero Trust is based upon being able to identify and control granular access to services. On one hand, identifying a user, device, etc. and applying the policies in both a static and dynamic context, is the base of Zero Trust. On the other hand, compromising identities and modifying behavior is why phishing is so successful.

Summary

Zero Trust and Defense in Depth are closely related – control access to everything. I spent a significant amount of time protecting the enterprise. Then I moved onto Defense in Depth. Though Zero Trust applies to both on premise and the cloud resources. it was with Google and GCP that I started learning more about Zero Trust. The controls required to support a Zero Trust Architecture (ZTA) are everywhere. There is well written documentation on how to slowly and very thoughtfully move to ZTA. There are ample numbers showing the cost of compromises – money and reputation. But ZTA’s biggest hurdle, same with security in general, is getting business folks to think of security and ZTA as costs in doing business, not add Ons, but requirements for a successful deployment.


Discover more from Threat Detection

Subscribe to get the latest posts to your email.

Leave a Reply

Discover more from Threat Detection

Subscribe now to keep reading and get access to the full archive.

Continue reading