Last year, the government announced zero trust guidelines and is encouraging the introduction of zero trust architectures. I'll tell you in detail what zero trust architecture is and how Watab can be used in this environment!
Traditional perimeter-based security models begin with the assumption that internal network access requirements (users, devices, etc.) can be trusted to a certain extent. Zero Trust, on the other hand, starts with the assumption that hackers can exist anywhere inside or outside the network, and all connection requests are unreliable.
All data and computing services that need to be protected are separated and protected into individual resources, and after connecting to a single resource, activities are only possible for the specified permission, and penetration is limited by continuous authentication when additional access to nearby resources is required.
Zero-trost does not mean a specific product line or solution, but rather a security paradigm based on a common understanding across the entire organization. The philosophy of zero trust must be embedded in all solutions introduced or newly introduced into the enterprise network, and each individual solution must organically collaborate to continuously authenticate normal users of the corporate network to give trust and manage access to corporate resources in detail.
When introducing a zero trust architecture, three core principles must be set up and managed so that they work properly, focusing on 6 basic philosophies.
I'll use a remote attack or insider threat scenario as an example.
If a malicious attacker hijacks a user device using Internet-based malicious code, or if the attacker is an insider with malicious intent, it is possible to continue to damage data stores, etc. through network access, privilege escalation, and lateral movement using normal user credentials illegally in an existing corporate network environment. It's there.
However, in a zero-trust environment, lateral movement is not possible because forged user credentials and devices are assumed to be suspicious until proven to be normal. Even if attackers pass user credentials and device authentication, access to data is restricted according to security policies, roles, etc., and access control is carried out in detail, making it difficult to work with sensitive data.
Furthermore, by analyzing user behavior through continuous logs and monitoring, additional authentication requirements and dynamic access restrictions are possible in the case of suspicious users. Even if some damage occurs, the range of affected resources will be reduced, and rapid response is possible.
Zero-trust architectures require monitoring of all states. All states include various states of access subjects (users and devices), resources (data, applications, servers, networks, cloud services, etc.), and policy servers. Instead of simply monitoring logs, events, etc., it is necessary to integrate multiple modules, servers, and services in an MSA environment to comprehensively monitor.
This status information must be monitored so that the current state can be understood numerically and visually, and future detailed analysis and audit must be possible through logs. Monitoring data and logs are a base data that can continuously verify the reliability of all access subjects and corporate networks currently connected, and dynamically manage access. This data requires long-term storage for later analysis, and its integrity must be guaranteed.
The current state of servers and applications can be grasped through various monitoring data from WTAP, and continuous auditing is possible through log monitoring. Immediate response is also possible through various notifications.
WTAP implements several functions reflecting the basic philosophy of zero trust.
As the limitations of traditional perimeter-based security models become clear, the importance of zero trust is being emphasized. In a zero-trust architecture configuration suitable for an enterprise, WhaTap can greatly help with related monitoring and visibility.