PER CASO D’USO
Zero trust security is a security model that trusts no one by default. In a zero trust model, anyone trying to access a company network must be continuously verified via mechanisms like multi-factor authentication (MFA). This enterprise security architecture uses such technologies to tightly control access and protect against data breaches.
Explore additional zero trust security topics:
The zero trust security model’s origins go back at least to the early 2000s, when a similar set of cybersecurity concepts was known as de-perimeterization. Forrester analyst John Kindervag eventually coined the term “zero trust security.” The zero trust approach came to the fore around 2009, when Google created the BeyondCorp zero trust architecture in response to the operation Aurora cyberattacks, which involved advanced persistent threats (APTs) that had eluded traditional network security architectures.
The core logic of a zero trust architecture is essentially “don’t trust, always verify.” In a world of complex cybersecurity threats and hybrid workforces equipped with numerous applications and devices, zero trust security (or ZTNA for short) aims to provide comprehensive protection by never assuming a request comes from a trustworthy source—even if it originates from within the corporate firewall. Everything is treated as if it comes from an unsecured open network, and trust itself is viewed as a liability within the zero trust framework.
Zero trust security may also be called perimeterless security. This term shows how it is the polar opposite of traditional security models, which follow the principle of “trust, but verify” and regard already-authenticated users and endpoints within the company network perimeter, or those connected via virtual private network (VPN), as safe. But such implicit trust increases the risk of data loss caused by insider threats, since it allows for extensive, unchecked lateral movement across the network.
A zero trust architecture instead is built upon:
Network users must be authenticated, authorized and validated in real time, and on an ongoing basis, to ensure that they always have the proper privileges. Numerous data points, such as user identity, geolocation and device posture, may be leveraged for this purpose. One-time validation of a user identity is no longer enough.
Zero trust security enforces the principle of least privilege, so that identities only get the lowest level of access to the network by default. In tandem with other cybersecurity practices such as network microsegmentation and adaptive access, least-privileged access sharply limits lateral movement within a zero trust security model.
Zero trust data security is important because it is the most reliable cybersecurity framework for defending against advanced attacks across complex IT environments, with dynamic workloads that frequently move between locations and devices. A zero trust architecture is especially important as multi-cloud and hybrid cloud deployments become more common and expand the range of applications that companies use.
Indeed, with the number of endpoints in the typical organization on the rise and employees using BYOD and personal devices to access cloud applications and company data, traditional cybersecurity methodologies can’t reliably prevent access from bad actors. A malicious insider who has already connected to the company network via a VPN would be trusted from then on, even if their behaviour were unusual — e.g., they were downloading enormous amounts of data, accessing from an unauthorized location, or accessing logins they had not previously ventured near.
In contrast, the zero trust model is always evaluating each identity on the network for risk, with a close eye on real-time activities. At the core of this approach is the concept of least-privilege access, which means each user is given only as much access as they need to perform the task at hand. Zero trust frameworks never assume that an identity is trustworthy, and accordingly require it to prove itself before being allowed to move through the network. Another way to think of zero trust security is as a software-defined perimeter that is continuously scaling and evolving to protect applications and sensitive data, no matter the user, device, or location.
Learn how traditional VPN solutions differ from zero trust security—and why a strong VPN alternative can benefit your business.
The main benefits of a zero trust model are:
Implemented properly, a zero trust security model is closely attuned to behavioral patterns and data points associated with all requests made to a company network. Zero trust security solutions may grant or deny access based on criteria such as:
Effective zero trust security will be highly automated, and its protections may be delivered via cloud and/or from an on-premises implementation. Identity providers and access management are key components of any zero trust framework, since they provide a variety of critical measures such as:
Cybersecurity solutions such as next-generation firewalls and secure browsers help isolate traffic from the main corporate network. This segmentation curbs lateral movement, reduces risk, and minimizes the damage of a breach even if it does occur. Because risky users are confined to a relatively small subnet of the network, they cannot move laterally without authorization. Under normal circumstances, microsegmentation security policies also help limit access by user group and location.
Classic VPNs do not align with zero trust principles, since one-time access gives a user the metaphorical keys to the kingdom. Instead of this castle-and-moat security approach, the zero trust model uses a dedicated VPN-less proxy that sits between user devices and the full spectrum of applications they need, from web and SaaS apps to client/server (TCP and UDP) based apps, and even unsanctioned web apps. This proxy can enforce granular cybersecurity measures, such as adding a watermark and disabling printing, copying, and pasting on an endpoint if the contextual evidence supports doing so.
Adaptive access and authentication allow organizations to understand the state of end user devices without having to enroll them with a mobile device management (MDM) solution. Based on a detailed device analysis, the system intelligently offers the user with a suitable authentication mechanism based on their role, geo-location, and device posture.
From one interface, administrators can manage all applications and resources across the enterprise. Unified endpoint management helps keep up with the rapid pace of updates to different applications and operating systems, plus it simplifies any complexity created by mergers and acquisitions.
Remote browser isolation redirects the user session from a local browser to a hosted secure browser service when the access occurs on an unmanaged device. This ensures users can access their apps in a sandbox environment and allows them to stay productive. At the same time, this protects endpoints and networks from malicious content from the internet with browser isolation capabilities, creating an airgap from corporate resources.
Security analytics solutions amass the valuable data needed for determining what counts as anomalous activity on a network. Networks can intelligently evaluate in real time whether a request is risky and help automate security enforcements based on user behaviour and anomalies detected in the system. This helps reduce manual work for IT, provides timely enforcement, and reduces the risk of breaches.
Software-defined wide area networks (SD-WANs) provide cloud security, including secure direct access to SaaS and traffic encryption, along with scalable bandwidth and intelligent traffic control for applications of all kinds.
Zero trust security is not a single product, but an overarching security framework for continuously evaluating risk and controlling secure access across an environment. Accordingly, multiple solutions, including but not limited to those described above, may be deployed in tandem to support a zero trust model.
The exact process for designing and building zero trust security will vary by organization and solution set, but a common progression will involve:
Citrix equips companies with end-to-end solutions for realizing a zero trust architecture that defends protected surfaces. From Citrix Analytics for Security to Citrix Gateway, organizations are able to implement all mission-critical components of a zero trust architecture—all in one secure digital workspace solution.