SlideShare a Scribd company logo
What is zero trust model of information 
security? 
The Zero Trust Model of information security simplifies how information security is 
conceptualized by assuming there are no longer “trusted” interfaces, applications, traffic, 
networks, or users. It takes the old model—“trust but verify”—and inverts it, because recent 
breaches have proven that when an organization trusts, it doesn’t verify. (Forrester) 
This model was initially developed by John Kindervag of Forrester Research and popularized as 
a necessary evolution of traditional overlay security models. It requires that the following rules 
be followed: 
 All resources must be accessed in a secure manner. 
 Access control must be on a need-to-know basis and strictly enforced. 
 Systems must verify and never trust. 
 All traffic must be inspected, logged, and reviewed. 
 Systems must be designed from the inside out instead of the outside in. 
The zero trust model has three key concepts: 
 Ensure all resources are accessed securely regardless of location. 
 Adopt a least privilege strategy and strictly enforce access control. 
 Inspect and log all traffic. 
“Outside-In” to “Inside-Out” Attacks 
According to a Forrester Research report, information security professionals should readjust 
some widely held views on how to combat cyber risks. Security professionals emphasize 
strengthening the network perimeter, the report states, but evolving threats—such as increasing 
misuse of employee passwords and targeted attacks—mean executives need to start buffering 
internal networks. In the zero trust security model, companies should also analyze employee 
access and internal network traffic. One major recommendation of the Forrester report is for 
companies to grant minimal employee access privileges. It also emphasizes the importance of log 
analysis; another recommendation is for increased use of tools that inspect the actual content, or 
data “packets,” of internal traffic.
Teams within enterprises, with and without the support of information technology management, 
are embracing new technologies in the constant quest to improve business and personal 
effectiveness and efficiency. These technologies include virtualization; cloud computing; 
converged data, voice, and video networks; Web 2.0 applications; social networking; 
smartphones; and tablets. In addition, the percentage of remote and mobile workers in 
organizations continues to increase and reduce the value of physical perimeter controls. 
The primary vector of attackers has shifted from “outside-in” to “inside-out.” Formerly, the 
primary attack vector was to directly penetrate the enterprise at the network level through open 
ports and to exploit operating system vulnerabilities. We call this attack methodology “outside-in.” 
In “inside-out” attacks, the user inside the “protected” network reaching out to an external 
website can be just as vulnerable as the user accessing the Internet from home. 
Zero Trust Recommendations 
 Update network security with next-generation firewalls. 
 Use a “sandbox” control to detect unknown threats in files. 
 Establish protected enclaves to control user access to applications and resources. 
 Use a specialized anti-phishing email protection service. 
 Use threat intelligence to prioritize vulnerability remediation. 
 Analyze logs using advanced machine learning algorithms to detect compromised and 
malicious users. 
 Implement an incident management system to minimize the impact of individual 
incidents. 
 Deploy a cloud services manager to discover, analyze, and control shadow IT. (Shadow 
IT is hardware or software within an enterprise that is not supported by the organization’s 
central IT department.) 
 Monitor your partners’ security postures using a cloud-based service. 
 Deploy an enterprise key & certificate management (EKCM) system. 
 Deploy a backup, cloud-based DDoS mitigation service. 
 Deploy a non-signature-based endpoint malware detection control. 
Some organizations use virtual local area networks (VLANs) to segment their network, but 
VLANs simply isolate network traffic—they are unable to enforce the control of privileged 
information. In addition, by itself, a VLAN cannot inspect your traffic for threats. True zero trust 
network segmentation requires an enterprise security platform that understands your 
applications, users, and content. 
Just remember: the zero trust model of information security means “verify and never trust.” 
Original article appeared on Kaplan University- School of Information Technology site at 
http://216.185.148.183/information-technology/articles/zero-trust-model. 
aspx#sthash.6ZLf2qHN.dpuf
References 
http://www.securitymanagement.com/article/zero-trust-model-007894 
http://www.securityweek.com/steps-implementing-zero-trust-network 
http://spyders.ca/reduce-risk-by-adopting-a-zero-trust-modelapproach-to-security/ 
http://www.cymbel.com/zero-trust-recommendations/ 
http://csrc.nist.gov/cyberframework/rfi_comments/040813_forrester_research.pdf

More Related Content

PDF
Zero Trust Model Presentation
PPTX
The Zero Trust Model of Information Security
PPTX
Zero Trust
PDF
Microsoft Zero Trust
PPTX
What is zero trust model (ztm)
PDF
NIST Zero Trust Explained
PPTX
Zero trust Architecture
PPTX
Zero Trust Model
Zero Trust Model Presentation
The Zero Trust Model of Information Security
Zero Trust
Microsoft Zero Trust
What is zero trust model (ztm)
NIST Zero Trust Explained
Zero trust Architecture
Zero Trust Model

What's hot (20)

PDF
Debunked: 5 Myths About Zero Trust Security
PPTX
Zero Trust Framework for Network Security​
PPTX
What is Zero Trust
PDF
Zero Trust : How to Get Started
PDF
Introduction to Cybersecurity
PPTX
Zero Trust Network Access
PDF
Building a Next-Generation Security Operations Center (SOC)
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPSX
Next-Gen security operation center
PDF
Cyber threat intelligence ppt
PDF
[Round table] zeroing in on zero trust architecture
PPTX
Security Operation Center Fundamental
PPTX
Zero trust deck 2020
PDF
Zero trust in a hybrid architecture
PPTX
An introduction to SOC (Security Operation Center)
PPTX
IBM Security QRadar
PPTX
Splunk Phantom SOAR Roundtable
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
5 Steps to a Zero Trust Network - From Theory to Practice
PDF
Navigating Zero Trust Presentation Slides
Debunked: 5 Myths About Zero Trust Security
Zero Trust Framework for Network Security​
What is Zero Trust
Zero Trust : How to Get Started
Introduction to Cybersecurity
Zero Trust Network Access
Building a Next-Generation Security Operations Center (SOC)
Security operations center-SOC Presentation-مرکز عملیات امنیت
Next-Gen security operation center
Cyber threat intelligence ppt
[Round table] zeroing in on zero trust architecture
Security Operation Center Fundamental
Zero trust deck 2020
Zero trust in a hybrid architecture
An introduction to SOC (Security Operation Center)
IBM Security QRadar
Splunk Phantom SOAR Roundtable
Cybersecurity 1. intro to cybersecurity
5 Steps to a Zero Trust Network - From Theory to Practice
Navigating Zero Trust Presentation Slides
Ad

Similar to What is zero trust model of information security? (20)

DOCX
“Verify and never trust”: The Zero Trust Model of information security
DOCX
Project Quality-SIPOCSelect a process of your choice and creat.docx
PDF
What Is Network Security Definition, Types, and Best Practices in 2024
PDF
Measure To Avoid Cyber Attacks
PDF
Measures to Avoid Cyber-attacks
PDF
The Zero Trust Security Model for Modern Businesses!
PDF
Application Security: Safeguarding Data, Protecting Reputations
PDF
The future of cyber security
PDF
Toward Continuous Cybersecurity with Network Automation
PDF
Toward Continuous Cybersecurity With Network Automation
PDF
Firewall buyers-guide
DOCX
Discuss how a successful organization should have the followin.docx
DOCX
Discuss how a successful organization should have the followin.docx
PDF
ThreatMetrix Profile in March 2014 CIO Review
PDF
ThreatMetrix Profile in March 2014 CIO Review
PDF
Clearswift f5 integration
PPTX
Phi 235 social media security users guide presentation
PPTX
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
PPTX
supply chain management.pptx
PDF
(Ebook) CIS Critical Security Controls by Center for Internet Security
“Verify and never trust”: The Zero Trust Model of information security
Project Quality-SIPOCSelect a process of your choice and creat.docx
What Is Network Security Definition, Types, and Best Practices in 2024
Measure To Avoid Cyber Attacks
Measures to Avoid Cyber-attacks
The Zero Trust Security Model for Modern Businesses!
Application Security: Safeguarding Data, Protecting Reputations
The future of cyber security
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity With Network Automation
Firewall buyers-guide
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
Clearswift f5 integration
Phi 235 social media security users guide presentation
SEMINAR ghajkakqkqkvnnkamsmAJAY PPT.pptx
supply chain management.pptx
(Ebook) CIS Critical Security Controls by Center for Internet Security
Ad

More from Ahmed Banafa (20)

PPTX
IoT and 5G convergence
PPTX
Quantum Computing and AI
PPTX
The convergence of IoT and Quantum Computing
PPTX
Quantum Internet Explained
PPTX
IoT and Covid 19
PPTX
Quantum Teleportation
PPTX
How blockchain is revolutionizing crowdfunding
PPTX
Blockchain technology and supply chain management
PPTX
8 key tech trends in a post covid-19 world edited
PPTX
Blockchain Technology and COVID19
PPTX
Ten trends of blockchain in 2020
PPTX
Quantum Computing and Blockchain: Facts and Myths
PPTX
Ten Blockchain Applications
PPTX
Hot technologies of 2019
PPTX
Blockchain and AI
PPTX
The Blockchain Wave in 2019 and Beyond - SJSU
PPTX
9 IoT predictions for 2019
PDF
Secure and Smart IoT using Blockchain and AI
PPTX
The Blockchain Wave in 2019 and Beyond
PPTX
New trends of IoT in 2018 and beyond (SJSU Conference )
IoT and 5G convergence
Quantum Computing and AI
The convergence of IoT and Quantum Computing
Quantum Internet Explained
IoT and Covid 19
Quantum Teleportation
How blockchain is revolutionizing crowdfunding
Blockchain technology and supply chain management
8 key tech trends in a post covid-19 world edited
Blockchain Technology and COVID19
Ten trends of blockchain in 2020
Quantum Computing and Blockchain: Facts and Myths
Ten Blockchain Applications
Hot technologies of 2019
Blockchain and AI
The Blockchain Wave in 2019 and Beyond - SJSU
9 IoT predictions for 2019
Secure and Smart IoT using Blockchain and AI
The Blockchain Wave in 2019 and Beyond
New trends of IoT in 2018 and beyond (SJSU Conference )

Recently uploaded (20)

PDF
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PDF
The Internet -By the Numbers, Sri Lanka Edition
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
Testing WebRTC applications at scale.pdf
PPTX
durere- in cancer tu ttresjjnklj gfrrjnrs mhugyfrd
PDF
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPT
tcp ip networks nd ip layering assotred slides
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
Cloud-Scale Log Monitoring _ Datadog.pdf
The Internet -By the Numbers, Sri Lanka Edition
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
Testing WebRTC applications at scale.pdf
durere- in cancer tu ttresjjnklj gfrrjnrs mhugyfrd
LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1
RPKI Status Update, presented by Makito Lay at IDNOG 10
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
SAP Ariba Sourcing PPT for learning material
522797556-Unit-2-Temperature-measurement-1-1.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
introduction about ICD -10 & ICD-11 ppt.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Introuction about ICD -10 and ICD-11 PPT.pptx
An introduction to the IFRS (ISSB) Stndards.pdf
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
tcp ip networks nd ip layering assotred slides
WebRTC in SignalWire - troubleshooting media negotiation
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...

What is zero trust model of information security?

  • 1. What is zero trust model of information security? The Zero Trust Model of information security simplifies how information security is conceptualized by assuming there are no longer “trusted” interfaces, applications, traffic, networks, or users. It takes the old model—“trust but verify”—and inverts it, because recent breaches have proven that when an organization trusts, it doesn’t verify. (Forrester) This model was initially developed by John Kindervag of Forrester Research and popularized as a necessary evolution of traditional overlay security models. It requires that the following rules be followed:  All resources must be accessed in a secure manner.  Access control must be on a need-to-know basis and strictly enforced.  Systems must verify and never trust.  All traffic must be inspected, logged, and reviewed.  Systems must be designed from the inside out instead of the outside in. The zero trust model has three key concepts:  Ensure all resources are accessed securely regardless of location.  Adopt a least privilege strategy and strictly enforce access control.  Inspect and log all traffic. “Outside-In” to “Inside-Out” Attacks According to a Forrester Research report, information security professionals should readjust some widely held views on how to combat cyber risks. Security professionals emphasize strengthening the network perimeter, the report states, but evolving threats—such as increasing misuse of employee passwords and targeted attacks—mean executives need to start buffering internal networks. In the zero trust security model, companies should also analyze employee access and internal network traffic. One major recommendation of the Forrester report is for companies to grant minimal employee access privileges. It also emphasizes the importance of log analysis; another recommendation is for increased use of tools that inspect the actual content, or data “packets,” of internal traffic.
  • 2. Teams within enterprises, with and without the support of information technology management, are embracing new technologies in the constant quest to improve business and personal effectiveness and efficiency. These technologies include virtualization; cloud computing; converged data, voice, and video networks; Web 2.0 applications; social networking; smartphones; and tablets. In addition, the percentage of remote and mobile workers in organizations continues to increase and reduce the value of physical perimeter controls. The primary vector of attackers has shifted from “outside-in” to “inside-out.” Formerly, the primary attack vector was to directly penetrate the enterprise at the network level through open ports and to exploit operating system vulnerabilities. We call this attack methodology “outside-in.” In “inside-out” attacks, the user inside the “protected” network reaching out to an external website can be just as vulnerable as the user accessing the Internet from home. Zero Trust Recommendations  Update network security with next-generation firewalls.  Use a “sandbox” control to detect unknown threats in files.  Establish protected enclaves to control user access to applications and resources.  Use a specialized anti-phishing email protection service.  Use threat intelligence to prioritize vulnerability remediation.  Analyze logs using advanced machine learning algorithms to detect compromised and malicious users.  Implement an incident management system to minimize the impact of individual incidents.  Deploy a cloud services manager to discover, analyze, and control shadow IT. (Shadow IT is hardware or software within an enterprise that is not supported by the organization’s central IT department.)  Monitor your partners’ security postures using a cloud-based service.  Deploy an enterprise key & certificate management (EKCM) system.  Deploy a backup, cloud-based DDoS mitigation service.  Deploy a non-signature-based endpoint malware detection control. Some organizations use virtual local area networks (VLANs) to segment their network, but VLANs simply isolate network traffic—they are unable to enforce the control of privileged information. In addition, by itself, a VLAN cannot inspect your traffic for threats. True zero trust network segmentation requires an enterprise security platform that understands your applications, users, and content. Just remember: the zero trust model of information security means “verify and never trust.” Original article appeared on Kaplan University- School of Information Technology site at http://216.185.148.183/information-technology/articles/zero-trust-model. aspx#sthash.6ZLf2qHN.dpuf
  • 3. References http://www.securitymanagement.com/article/zero-trust-model-007894 http://www.securityweek.com/steps-implementing-zero-trust-network http://spyders.ca/reduce-risk-by-adopting-a-zero-trust-modelapproach-to-security/ http://www.cymbel.com/zero-trust-recommendations/ http://csrc.nist.gov/cyberframework/rfi_comments/040813_forrester_research.pdf