Page 36 - Informatics
P. 36

Technology Update


         Key Steps to Zero Trust Model                                           context to grant/deny access
                                                                               •  Grant least privileges – grant access to resources
                                                                                 explicitly requested by user rather than resources
                                                                                 by virtue of user identity or network
                                                                               •  Monitoring  and  audit – monitor all access re-
                                                                                 quests and patterns for establishing normal and
                                                                                 identify anomalies based on normal.
                                                                               Zero trust can be achieved using most of the exist-
                                                                               ing tools and technologies already deployed in the
                                                                               environment with augmentation of a few new ones.
                                                                               It has more to do with design change rather than
                                                                               technology change. The technologies which can be
                                                                               used for achieving zero trust in a data center can
                                                                               include  (not  limited  to)  disk  encryption,  database
                                                                               encryption, database access management, privilege
               Verify Users         Validate Devices    Limit Previleged Access  identity/access management using multi-factor au-
                                                                               thentication, network micro-segmentation, next-gen
                                                                               firewall, network intrusion prevention, host intrusion
          ment. Get more visibility into what’s on your network   lowing reasons:  prevention, virtual private network, log monitoring
          so you can secure it with a zero-trust approach.  •  Criticality of the data  and analysis. The tools for office network can include
                                            •  Variety and volume of data      user identity management with multi-factor authen-
          •  Workforce security: control who gets access  •  Importance of availability of services  tication, network access control, endpoint protection
            Assume  zero  trust  until  you  can  verify  the   •  Diversity of environments  solution, network micro-segmentation and next-gen
          trust-worthiness of your users’ identities and the se-               firewall with anti-advanced persistent threat.
          curity of their devices. Protect against phishing and   •  Shortage of skilled resources
          other identity-based attacks.     Typical environment in a government setup includes
          •  Workload security: protect the entire application   data centers housing data & services and office net- Advantages of Implementation
           stack                            works housing users & devices. Zero trust has to be   of Zero Trust
           Secure access for APIs, micro-services, or containers   planned for both the environments separately with
          accessing a database within an application, no mat-  necessary  tools,  policies  and  procedures  in  place.   Various  advantages  of  implementation  of  zero
          ter where it’s located--in the cloud, data centres, or   The steps to zero trust can be:  trust can be,
          other virtualised environments. Segment access and                   •  Decreases risk by discovering assets and improv-
          identify  malicious  behaviour  to  contain  breaches                  ing visibility into them
          and protect against lateral movement.                                •  Protect data
                                                                               •  Reduce time to breach detection and gain visibili-
          •  Device security: control user and IoT devices                       ty into enterprise traffic
          Get visibility into, better secure, and control every                •  Reduce the complexity of the security architecture
          device accessing your applications and network at                    •  Deliver both security and an improved end-user
          all times. That includes Internet of Things (IoT), net-                experience
          work-enabled devices, and (managed and unman-
          aged) user devices like APIs, cameras, HVAC systems,                 Summary
          printers, medical equipment, and more.
                                                                                 Zero  trust  is  not  a  technology  rather  an  infra-
          •  Visibility  and  analytics:  gain  insight  to  enforce           structure design principle built on security. It takes
           security                                                            care of the modern threats faced by enterprises at
          Improve or increase visibility and analytics for your   ĞƌŽ dƌƵƐƚ  ƌĐŚŝƚĞĐƚƵƌĞ ĚĞĮŶĞƐ Ă ĨƌĂŵĞ-  the hands well-resourced and persistent adversar-
          users and admins by gaining insight to unknown or   ǁŽƌŬ ĨŽƌ ƐƚƌƵĐƚƵƌĂů ĐLJďĞƌ ƐĞĐƵƌŝƚLJ ŽĨ ŵŽĚ-  ies. It begins with concept of isolation of resources
          unidentified  assets  on  your  network,  across  work-  ĞƌŶ ĞŶƚĞƌƉƌŝƐĞƐ͘ /ƚ ĐŽŵďŝŶĞƐ ƐŽŵĞ ŽĨ ƚŚĞ   and  access  based  on  requests  after  proper  verifi-
          loads  or  applications.  Integrate  with  other  data               cation. Adoption of zero trust requires modification
          sources to use information intelligently to create and   ĂůƌĞĂĚLJ ǁĞůů ŬŶŽǁŶ ĂŶĚ ĞƐƚĂďůŝƐŚĞĚ ƐĞĐƵ-  of policies and tweaking user behaviour to achieve
          enforce policies that strengthen your overall security   ƌŝƚLJ ŐƵŝĚĞůŝŶĞƐ ĂŶĚ ŚŝŐŚůŝŐŚƚƐ ƚŚĞŵ ĂƐ ƚŚĞ   the desired goals. It does not require a complete re-
          posture.                            ďĂƐŝĐ ŽĨ ƚĞŶĞƚƐ ŽĨ ƚŚĞ ĨƌĂŵĞǁŽƌŬ͘  placement of existing tools and technologies. New
                                                                               infrastructure being created can be designed on zero
          •  Automation and orchestration: respond to threats
           quickly                                      R S MANI               trust from the beginning. Existing infrastructure can
          The ability to integrate and automate security across                be migrated gradually. Zero trust is not a choice any
          your entire IT environment - for applications, net-  Deputy Director General, NIC  more, it is the way future infrastructure has to be de-
          works, and workloads - is key for the success of your                signed to survive the cyber threats.
          zero-trust  strategy.  By  automating  policy  enforce-  •  Identify resources – data, assets, applications and
          ment consistently across your environment, you can   services
          prevent a breach and also automate your threat re-  •  Authenticate and authorize users  –  user  access
          sponse to more quickly contain a breach.  policies should be based on identity
                                            •  Contextualize request – grant access to resources   For further information, please contact:
          Implementation of Zero Trust in     from users not only based on identity but other   R S Mani
                                              environment  parameters  like  device  used,  net-
          Government ICT Environments         work hooked on to, date and time of request, past   Deputy Director General & HoG
                                                                               National Informatics Centre, A-Block, CGO Complex
            The government can benefit greatly from imple-  history and pattern of access, etc.  Lodhi Road, New Delhi - 110003
          menting zero trust architecture because of the fol-  •  Adaptive policy – define access policies based on   Email: rsm@nic.in, Phone: 011-24305397


         36  informatics.nic.in  April 2020
   31   32   33   34   35   36   37   38   39   40   41