window.onload = function() { console.log(document.getElementById("input_18_4_1").value); document.getElementById("input_18_4_1").checked = true; } lang="en-US"> What is the Zero Trust Model (ZTM) | Datafloq
Site icon Datafloq

What is the Zero Trust Model (ZTM)

The Zero Trust Model of information security simplifies how information security is conceptualized by assuming there are no longer trusted interfaces, applications, traffic, networks, or users. It takes the old model trust but verify ‘and inverts it, because recent breaches have proven that when an organization trusts, it doesn’t verify [6].

This model requires that the following rules be followed [6]:

The zero-trust model has three key concepts:

Outside-In to Inside-Out Attacks

According to a Forrester Research report, information security professionals should readjust some widely held views on how to combat cyber risks. Security professionals emphasize strengthening the network perimeter, the report states, but evolving threats ‘such as increasing misuse of employee passwords and targeted attacks ‘mean executives need to start buffering internal networks. In the zero-trust security model, companies should also analyze employee access and internal network traffic. One major recommendation of the Forrester report is for companies to grant minimal employee access privileges. It also emphasizes the importance of log analysis; another recommendation is for increased use of tools that inspect the actual content, or data packets, of internal traffic [1].

Teams within enterprises, with and without the support of information technology management, are embracing new technologies in the constant quest to improve business and personal effectiveness and efficiency. These technologies include virtualization; cloud computing; converged data, voice, and video networks; Web 2.0 applications; social networking; smartphones; and tablets. In addition, the percentage of remote and mobile workers in organizations continues to increase and reduce the value of physical perimeter controls [2].

The primary vector of attackers has shifted from outside-in to inside-out. Formerly, the primary attack vector was to directly penetrate the enterprise at the network level through open ports and to exploit operating system vulnerabilities. We call this attack methodology outside-in. In inside-out attacks, the user inside the protected network reaching out to an external website can be just as vulnerable as the user accessing the Internet from home [5].

Zero Trust Recommendations

Just remember: the zero-trust model of information security means verify and never trust.

Ahmed Banafa, Author the Books:

Secure and Smart Internet of Things (IoT) Using Blockchain and AI

Blockchain Technology and Applications


Interested in what the future will bring? Download our 2025 Technology Trends eBook for free.

This field is for validation purposes and should be left unchanged.


Read more articles at: https://medium.com/@banafa

References

[1] https://www.securitymanagement.com/article/zero-trust-model-007894

[2] https://www.securityweek.com/steps-implementing-zero-trust-network

[3] https://spyders.ca/reduce-risk-by-adopting-a-zero-trust-modelapproach-to-security/

[4] https://www.cymbel.com/zero-trust-recommendations/

[5] https://csrc.nist.gov/cyberframework/rfi_comments/040813_forrester_research.pdf

[6] https://go.forrester.com/research/

Exit mobile version