Quick Read

The user and the device: the two most critical pillars of a Zero Trust Architecture

Introduction

The Zero Trust Architecture (ZTA) is a novel conception of network construction designed to eliminate the overall concept of “trust” from day-to-day network operations. Currently, security is traditionally relegated to the network’s perimeter: if access was granted to a specific user’s account, then that user is free to enjoy the privileges associated with said account. The ZTA security model eliminates the idea of trusted networks, devices, personas, or processes, and shifts to multi-attribute and multi-checkpoint-based confidence levels that enable much more granular authentication and authorization policies.

President Biden signed an executive order pertaining to cybersecurity on January 19, 2022. This executive order further emphasizes already laid-out security measures and gives agencies with national security systems 60 days to update agency plans to prioritize resources for the adoption and use of cloud technology, including the adoption of the Zero Trust Architecture.

The momentum towards this executive order can be traced back to April 2021, when DISA and the NSA released a 163-page document on the DoD Zero Trust Reference Architecture. This document is quite expansive and a bit intimidating. Our cybersecurity team has reviewed it thoroughly, so you don’t necessarily have to (though you certainly should read pages 1-21 at a minimum). One of the most critical points discussed are the seven key pillars — or focus areas — to implementing a zero trust environment.

The seven pillars of a Zero Trust environment

  • User: Securing, limiting, and enforcing person, non-person, and federated entities’ access.
  • Device: Having the ability to identify, authenticate, authorize, inventory, isolate, secure, remediate, and control all devices.
  • Network/environment: Segment (both logically and physically), isolate and control the network/environment (on-premises and off-premises) with granular access and policy restrictions
  • Applications & workload: Applications and workloads include tasks on systems or services on-premises, as well as applications or services running in a cloud environment
  • Data: Zero Trust protects critical data, assets, applications, and services
  • Visibility and analytics: Vital, contextual details provide a greater understanding of performance, behavior, and activity baseline across other Zero Trust pillars
  • Automation and orchestration: Automate manual security processes to take policy-based actions across the enterprise with speed and at scale
Zero Trust Architecture pillars
These are the pillars of the Zero Trust Architecture. These pillars are the critical points of implementing a ZTA. Of these pillars, the user and device are highlighted as that is where it all begins.

Where to start: identity and authentication

The two most critical pillars are the user and the device; this needs to be the starting point. “All roads lead to identity and authentication,” says ZKX’s Chief Technologist Collin Sweeney. “The words ‘Zero Trust’ say it all: you aren’t going to trust any entity inherently. A ruggedized rigid process by which users can prove their claimed identity to another party is necessary.” Therefore, the user and device are the two most critical pillars and the starting point of Zero Trust.

The Cybersecurity and Infrastructure Security Agency (CISA) claims identity is defined as an attribute or set of attributes that uniquely describes an Agency user or entity. The agency needs to ensure the correct users have the right access, which is done by verifying their identity. A similar process takes place for the device. The main difference is instead of verifying a user or entity it is the verification of hardware connecting to a network.

Not all pillars can be achieved within the same solution. If you inherently have no trust, you need a way to authenticate the users and devices on your network. You must walk before you can run and by starting with the user and device you are doing just that. In implementing a ZTA, the goal is to protect your most valuable Data, Assets, Applications, and Services (DAAS). The first line of defense is making sure no unauthorized user or devices has access. Therefore, all roads lead to identity and authentication.

ZKX: the solution for user and device authentication

The ZKX MFA Engine offers seamless and frictionless multi-factor authentication designed to embody the foundational principles of zero-trust. This is done by its lightweight construction and intentional “bottom-up” philosophy — integrating the enterprise with the edge, not the other way around. The benefits of the ZKX Engine are:

  • Authenticates user and their device simultaneously
  • Protects personal data by not storing personal information
  • No data is at risk if the endpoint device is compromised
  • Interoperable with various network mediums such as satellite, RF radio frequency, and IP networks
  • Can adapt to policy requirements
  • Deployed following policies already outlined
  • Confidence levels can be enhanced simply by continued challenging of a user’s identity, it is not all or nothing

Conclusion

Not all pillars of Zero trust are achievable simultaneously, and any organization promising to do so is immediately suspect. The best way to start a graceful migration to a zero trust network is to think about how users and devices get authenticated. If unauthorized devices or users can access your network, then none of the other pillars even matter anyway. ZKX provides a solution to tackle the two most critical pillars of a ZTA — user and device authentication — all in one solution.