Contributing Subject Matter Experts: Michael Wilcox, Joseph Karpenko, Rob Forbes, Bill McKenzie, Jeff Riggen
This document is the third in the six-part Technical Manager’s Guide to Zero Trust series, which articulates critical links between zero trust (ZT) and security strategy within each of the six ZT pillars: identity, devices, network, infrastructure, applications, and data.
The zero trust (ZT) concept formalizes a change in security strategy that was initially dubbed “de-perimeterization”—a shift from a focus on hardening the corporate network perimeter against leaks and attackers to one that concentrates resources on protecting corporate intellectual property by focusing on identity (who or what is seeking access to resources on the network) and data (what resources are they seeking, and what level of access and authorization should they be granted). Zero trust strategies integrate key “pillars”—identity, devices, network, infrastructure, applications, and data—into the ZT framework, connecting priorities and activities in each area to create a holistic defense of enterprise assets.
Network plays a unique role in this transition. On one hand, the network itself moves from its position as the primary focus of security activity to one of six interrelated areas, and this loss of primacy can be difficult for legacy network-centric security professionals and organizations to absorb. On the other hand, the network is central to the integration referenced above: it is the means by which all other pillars connect. As one expert contributing to this document observed, “an application doesn't live in thin air.” It may run in a corporate data center, in the cloud, or across multiple distributed functions, but in all cases, applications require network access to resources while users require network access to applications and data.
Technical managers responsible for ZT network security need to establish an approach that spans multiple related activities:
This is not a “project” type challenge; it requires continuous effort and investment focused on building enhanced capabilities over time.
The network is central to digital infrastructure—and it is a critical point for actual execution of zero trust.
Corporate networks become more complex every day. With “users” expanding beyond human actors to include software and autonomous devices (as with IoT), and infrastructure extending past physical and VPN connections to cloud-based resources and mobile access, “there’s no edge of the network.” Most security teams can’t keep pace with this sprawl: As one contributor stated, “I have yet to work with a single client who knows all of the ingress, egress, and access points within their environments.” Corporate business activities, such as mergers and acquisitions (M&A), will further complicate the task of establishing a clear, accurate, up-to-date understanding of the enterprise network.
Technical managers responsible for network security in a ZT environment respond to this complexity by focusing “more on the process” than on individual connections. Network ZT supports the overall strategy by providing visibility into key issues, including mapping of workflows and “segmentation, secure access to data, applications, or resources from identities or devices.” As one contributor noted, “you can’t really have ‘trust’ until you have visibility.”
Takeaway : Zero trust has its roots in de-perimeterization, which shifts security focus from hardening the network to focusing security resources on protecting corporate intellectual property. Network still plays a critical role in ZT, however. Network is the nexus for all other ZT pillars and provides essential perspectives on connections and workflows that span the corporate environment. ZT network managers enable cross-pillar visibility that is critical to ZT strategy.
To build a cohesive approach to zero trust, security leadership needs to achieve a judicious balance of interests and objectives. These include driving investment and attention to areas of greatest need within the enterprise IT delivery environment and constructing a comprehensive approach to defense of corporate assets. Each pillar has professionals charged with executing on plans within their domain, and each is essential to success of the ZT strategy.
What impels networking security managers to commit to a broader ZT vision, and what factors cause ZT-responsible management to prioritize investment in the network?
Contributors to this document identified four interest and investment drivers that align both perspectives in support of network ZT: criticality, fear, opacity, and complexity. These factors each motivate ZT-focused network security measures and combine to create an environment where ZT network is a compelling business priority.
The first factor driving ZT network interest and investment is the understanding that digital infrastructure—including, and especially, the network—is business infrastructure in today’s world. “One of the things we learned in the pandemic,” a contributor observed, “is that the line between digital business and business is gone. All business is digital.” Drilling down, this means that “your network includes everybody you do business with—all your suppliers, all your investors, all of your customers, all of your prospects, all of your employees, subcontractors.” Each new constituency needs to provide and access data. “There is going to be a stew of your corporate data, people's personal data, other corporations’ data—data that needs to be somehow walled off from a network perspective.”
The downside to technology infrastructure providing the platform for digital business is that this status makes corporate systems an attractive attack target and makes breaches and failure front-page news. There is a concurrent belief that traditional perimeter-focused security strategies will fail to adequately defend against this mounting pressure: “Traditional security in networking doesn't work.”
Discussion on this topic considered the need to address issues that span multiple functions, including comments to the effect that traditional approaches are “not application aware” or lack the ability to “move up the stack.” These types of constraints arise from an orientation that builds capability silos—or from a ZT perspective, from a lack of connectedness to issues that are handled within other zero trust pillars.
Key point: Digital business makes corporate intellectual property both critical to operational success and a priority for protection against loss or attack. Intense public (including shareholder and regulator) interest in data security brings scrutiny to breaches—and as one contributor put it, “That's why people are investing in [ZT network]. They don't want to be on the front page of the paper tomorrow.”
In the digital world, enterprise networks span many kinds of environments and connections:
This complexity has been a major challenge for security teams tied to traditional perimeter-based strategies: There is no real perimeter in complex environments. At one time, using VPNs to secure connections to resources housed in corporate data centers helped putty over the authorized incursions from individual external devices and users, but this approach is impractical when the resources are housed in the cloud. The VPN creates a high-overhead bottleneck that increases cost and degrades performance, and the cloud itself expands the perimeter beyond the reach of traditional tools.
Key point: There is a seemingly endless cascade of new network types, new kinds of connected devices and environments, and new security tools and protocols to defend against the new vulnerabilities that these assets create. As a Stratascale SME noted, “existing tools have failed [to protect] the existing components.” Reactive and perimeter-oriented strategies can’t keep pace with the expanding protect surface. Zero trust provides a basis for a proactive network security strategy.
Fear—of unknown threats, of complexity that masks vulnerabilities and creates attack vectors, of public disclosure of breaches that can have multi-billion dollar impacts on valuations (and deleterious effects on security leadership career trajectories)—can be seen as the awning under which the other ZT network drivers connect.
Fear is not necessarily a negative factor in strategy development: It focuses attention on highest-value, the most-vulnerable, and the most frequently attacked vectors and assets within an enterprise. And fear is fed by opacity—the inability to clearly see and define threats to key assets. As a result, ZT network experts stress the importance of visibility as a network security attribute.
The Stratascale report “Key Zero Trust Technologies and Management Imperatives” positions visibility as a foundational aspect of corporate ZT strategy as well as a critical ZT network issue. Network security managers need to obtain immediate visibility into vulnerabilities and attacks as they arise. They can mitigate fear of the unknown by providing real-time insight into threats and requirements and enable effective remediation of issues before they damage corporate assets.
Key point: Fear is a natural reaction to the business and professional threats that result from breaches. As the saying goes, “sunshine is the best disinfectant.” In this context, “sunshine,” or clarity, is achieved by addressing complexity and visibility challenges. As one contributor to this report observed, “different [disconnected IT and security] initiatives cause loss of visibility—and now, we don't know how to control access to resources. We lack the visibility needed to know and understand what's accessing [which resources], and when.” In a ZT network context, visibility is both a critical capability and a means of providing a healthy, fact-based response to amorphous fears of cyberattack.
Priority 1: Catch up to the environment and requirement. Asked what they identify as key priorities for firms looking to align network security with zero trust, one Stratascale SME said bluntly that many firms are “still so far behind the technology they haven't taken step one” towards ZT. Executives, the SME believes, have a grasp on the problems, including the mix of corporate and non-corporate access devices and assets, and the need to prevent unauthorized access to sensitive data. But many “say ‘zero trust’ like it's a solution that you just open a box and implement,” and it is not: It’s the beginning of a strategic discussion that requires years’ worth of hard work to translate into a robust approach to comprehensive protect surface coverage.
Priority 2. Align your approach with your corporate infrastructure. One of the key foundations of ZT network is microsegmentation—the ability to tightly define where data and access (from users, devices, or between applications) can and cannot connect. Microsegmentation works best when it aligns closely with the corporate infrastructure—with the different facilities (including cloud and hosted as well as on-premises) where data is stored and with the applications that will look for data and resources.
Committing to an approach that wraps in staff responsible for securing other ZT pillars, including infrastructure and applications, as well as identity, devices, and data, pays dividends by ensuring that a key element of your ZT network strategy connects optimally with the systems and information that it is protecting, and establishes a basis for further cross-pillar collaboration in the future.
Priority 3: Commit to a staged approach and to proving value throughout the ZT network journey. This is almost a “bait and switch” priority. Articulating a staged approach—and identifying the “low hanging fruit” objectives that demonstrate value as the journey progresses—requires ZT network managers to develop visibility into where data and applications reside, and how users (and non-human connections, such as IoT devices and application-to-application dependencies) interact with resources. With these inputs, ZT network managers can define a strategy that includes checkpoints which can help colleagues understand benefits as they are delivered.
Because network ZT is so complex, a staged approach is absolutely necessary: No security team can (or should attempt to) deploy all the potential ZT network defenses at once. In this type of extended deployment scenario, it’s “good business” to create opportunities for demonstrating that the steps in the journey have discrete value, and for communicating these benefits to colleagues and other stakeholders. It’s important to note, though, that protect surface priorities can be defined in different ways. Three common approaches include:
ZT network managers need to balance these three considerations (potentially assigning highest priority to assets that are subject to frequent exploit attempts) and ensure that both the objective and the reason for prioritizing it is clearly understood within the business. At the same time, ZT network managers need to guard against the temptation, sometimes apparent in engineering-led cultures, to build out entire frameworks before demonstrating any functionality. All corporate stakeholders will expect ZT managers to establish an incremental path to evolving ZT capability.
Takeaway: ZT network priorities stress the need for a systematic approach to capability building. As the new twist on an old saying holds, “the journey of 1,000 miles doesn’t really start with a single step—it starts with a plan.” Current ZT network challenges have evolved over a period of years, and will continue to evolve, and the strategies, technologies, and practices designed to proactively address these challenges will also roll out over time. ZT success, in network and across the organization, relies on continuous improvement. In the words of a Stratascale SME, “Nobody will ever be purely secure. But if every day I take on a problem and solve one aspect of it, then I move the needle. You don't have to make huge jumps to move that needle—to have a large [cumulative] impact—and I think a lot of people forget that. Start with the fundamentals, keep building on them. It goes back to a culture [with everyone continuously asking] how do we get better?”
Each document in the Technical Manager’s Guide to Zero Trust series incorporates a roadmap providing practical guidance to readers looking to implement ZT within their areas. The advice offered by contributors to this document addresses eight important steps:
ZT network security offers compelling benefits, and the graphic above defines a workable path for technical managers responsible for its execution. But no strategy is immune to real-world challenges. Where are these most likely to arise on the path to establishing ZT networks? Stratascale SMEs contributing to this document identified three impediments that infrastructure security managers may need to overcome during their ZT journey:
As part of its Executive Guide to Zero Trust research series, Stratascale published the report, Key Zero Trust Technologies and Management Imperatives. The ZT network section of this report highlights the following technologies or practices that managers should understand as they plot their ZT network strategies:
Microsegmentation is the starting point for most ZT network authorities. In the words of one contributor to this document, “everybody has VLANs and stuff like that. Microsegmentation is [central to] the ZT end goal. You want to have specific rules for a device: ‘These data flows go there, and nothing else shall pass.’”
This distinction matters in a zero trust context. Segmentation is generally deployed in terms of rules that apply to a group of resources, such as a set of databases. Microsegmentation drills down to identity (human and non-human), device, data, and resource-specific data flows.
Contributors to this document noted that the depth of segmentation used by an organization varies with maturity. Some firms have “flat networks” that lack segmentation; others have progressed only as far as VLANs and group-based policies. Organizations with more mature ZT network approaches use microsegmentation that considers identity, device, data, and resources. Firms plotting a ZT journey can position segmentation as a means of improving alignment of defenses with sensitive data and other high-value corporate intellectual property.
Encryption seems like it might fit most naturally within the application or data pillar, but many organizations implement encryption within the network. Applications don’t apply encryption consistently, and some legacy applications may not encrypt data at all. Network layer encryption ensures that all data is encrypted and can simplify management: The encryption can be performed through different devices on the network (load balancers, firewalls) or via a software proxy. It should be noted that while this approach satisfies the need to encrypt “north side” data—for example, ecommerce communications between a facility and a customer—it may not always encrypt “south side” data: Internal traffic (within a corporate data center, or within the cloud) may still be clear text.
Visibility is a complicated topic in zero trust: It applies at both the network level and (as a “foundational requirement”) across the entire ZT environment. At a macro level, visibility (and analytics) references the capacity to aggregate, digest, and act on information that spans all pillars and the entire protect surface. This insight relies to a large extent on visibility developed at the network level. It is crucial for ZT network managers to have deep insight into network functions, performance, and potential vulnerabilities and threats. ZT requires success across and within each of the pillars, but the network’s unique position as a nexus for access and data makes visibility a key ZT network attribute: A ZT network enables teams to see vulnerabilities and attacks as they arise. This enables network security to take action to prevent attacks from expanding within the corporate environment and issue appropriate intelligence to other pillars as required.
The pandemic exposed a fundamental flaw in VPN-centric remote access strategies: As the migration of workloads to the cloud kept accelerating, an architecture mandating that a remote user tunnel into a central facility to access cloud-based resources was a poor use of budget, time, and bandwidth. VPNs that only authenticate on entry and then permit access to a vast swath of corporate assets are also a poor fit with zero trust. Moving forward, security leaders will look to establish software-defined perimeters, inspecting traffic and defining rules that govern resource access regardless of where the user or resource is located. Many organizations deploy cloud access service broker (CASB) or secure access service edge (SASE) technologies to address this requirement.
ZTNA—often referring to “Zero Trust Network Access” and sometimes used as an acronym for "Zero Trust Network Architecture"—is a common term in ZT discussions. It isn't included in this list because products marketed in this category combine several of the core ZT network capabilities described above: “Depending on the vendor, [ZTNA can include] SDP/VPN replacement, microsegmentation for cloud and endpoint devices... CASB and DLP is also included in several vendors' ZTNA products; additionally, you'll see some vendors toss in MFA into their ZTNA.”
This isn't to say that ZTNA may not play an important role in a ZT network strategy. Security managers are often torn between acquiring “best of breed” products that might or might not integrate with other components used in the environment versus “best of group” products that may not be best in a specific area, but which integrate needed capabilities. ZTNA may well be a powerful solution for a specific organization—but it’s incumbent on ZT network management to identify the requirements that a specific ZTNA solution addresses, ascertaining which are truly gaps in the current environment and which may overlap other tools that are already deployed.
At the end of the research discussion, contributing SMEs were asked to propose recommendations that will help Stratascale client managers succeed in establishing zero trust infrastructure security. These recommendations include:
As part of its zero trust research program, the Stratascale team has developed the Stratascale Zero Trust Metrics in Context and Action (Stratascale ZT-MICA) metrics set, which provides strategic insights to executives, operational perspectives to IT and security management, and tactical data to managers responsible for ZT within each of the six pillars.
ZT network security management metrics within Stratascale ZT-MICA include:
Collectively, these measurements help network security managers assess readiness and progress over time and identify and respond to areas of need before they are exploited.
Readers looking for a downloadable version of Stratascale ZT-MICA can follow this link (no cost, but registration required).
In its “Zero Trust Vendors to Watch, Know, Understand: ZT Network” series, Stratascale experts reviewed 120 vendors to identify those that could be important to ZT network strategies in the four core areas discussed in the “important ZT network technologies and management imperatives” section of this document—microsegmentation, encryption, visibility, and VPN replacement/SDP.
Caveats to consider in reviewing the lists below:
Results of these analyses are available in individual reports (linked via the section headers below). Vendors discussed in these reports include:
Alkira |
Aviatrix |
Carbon Black |
Cisco |
ColorTokens |
Cyolo |
Ericom |
Fortinet |
GuardiCore |
iboss |
Illumio |
Juniper Networks |
Netskope |
Nile |
Palo Alto Networks |
Perimeter 81 |
Pulse Secure |
Saviynt |
ShieldX Networks |
VMware |
WiteSand Systems |
Zscalar |
|
|
Networks |
Akamai |
Arbor Networks |
Arista |
Aruba Networks |
Awake Security |
Cat Networks |
Check Point |
Cisco |
Cloudflare |
Corelight |
Darktrace |
Extrahop |
F5 Networks |
Fastly |
FireEye |
Fortinet |
Gigamon |
IronNet Cybersecurity |
Lastline |
McAfee |
MixMode |
Netscout |
Plixer |
Vectra AI |
Zscalar |
|
|
|
|
Stratascale brings a unique combination of expertise, solution depth and vendor relationships and insight to the cybersecurity market. Readers seeking support in developing zero trust strategies are encouraged to contact their Stratascale Client Advisor or to connect with us at stratascale.com/contact-us/.
This is the third of six documents included in Stratascale’s “Technical Manager’s Guide to Zero Trust” research series. We have also published an eight-part companion series, “The Executive Guide to Zero Trust”, available on the Stratascale website.
Readers interested in specific executive-level perspectives on zero trust may wish to explore the other publications in this series:
Michael is a world-leading IT industry analyst. He has led North American and global initiatives focused on developing insights and strategies that connect technology solutions with business needs, combining data, knowledge, analysis and advanced content delivery to define options for IT and buy-side businesses.