2.1 Defining Zero Trust Networks - ZN
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
Now let's look at the learning objectives or the next section, which is defining. Zero trust networks in this section will look at the fining zero. Trust networks will also look at an example using Barris Total, which is a pretty popular website
that is used to scan
You are l's and hashes,
um, to give us a sense of, ah, threat score and how that fits into zero trust.
We'll also look at what zero trust networks are,
and we'll also look at what zero trust networks are not in the next section. Thank you so much. Stay tuned.
So let us define zero trust networks.
The concept of zero trust is that we don't place inherent trust in our users devices, applications in traffic.
Let me share with you a quick illustration using baseball umpires debate in their different philosophies of officiating the game.
The first umpire states. There's balls and their strikes, and I call them the way they are.
The second umpire disagrees and says There's balls and their strikes, and I call them the way I see them.
That's no better, says the third umpire. There are balls and there are strikes and they aren't anything until I call them.
So the first umpire really represents objective truth.
It's independent of the mind of the no er truth,
and they're to be discovered type of truth.
The second Umpires. Truth is, as each person sees it, type of truth, in my opinion. And the third umpire represents the type of truth that each of us create for ourselves.
So two questions to think about after this illustration.
Which umpire do you believe you have in your network in the form of network security
and number two?
Which umpire do you believe you get with zero trust networks?
Zero Trust networks Aim is to be the first umpire that calls it the way it is.
Zero trust networks are designed to move away from traditional network architectures that create their own truth or narrative
about your network or decides to monitor, detect and prevent differently. Based on how things are viewed by a particular vendors virtual or physical appliance
you may have in your network or your security stack.
So let's take a quick example of virus total.
So Lyons Total is a website that checks against many anti virus products and their scan engines to essentially call a vote on whether or not a file or you are. L is viewed as benign or malicious by some or all anti virus scanners available on the Web site.
And this approach seems to me to represent how Annie bars products call things, the way they see it and not the way they are.
Anti virus products represent Umpire number two
C virus Total tries to calculate its threat score from more than one data point, which is a good pig.
We need that replay value the same way we do
in sports to get it right.
Security architectures should not rely on its own knowledge and should not create its own narrative.
With zero trust networks, Maur information needs to be supplied to the operator and Ministry of Console Appliance that makes the decision to allow or deny access,
which makes productivity safer and faster.
model is a concept.
This model sees trust as a vulnerability,
so trust in a user device application and the traffic must be traced back to something without compromise, and the management of that must be guarded. You know this model treats all host as if they're on the public Internet, and with that assumption
they must be considered compromise or hostile.
So zero trust is really about securing the network in a way that makes all service is better and faster for all users, all devices, all applications and all the traffic.
You know, I was listening to a podcast a few weeks ago, Title the Architect show,
and a CTO was speaking about security.
He used the analogy that cars have breaks so they can go faster
and not go slower.
And with good security, we could enable our workforce toe work faster because we have the right breaks in place, meaning the right security in place
when cars didn't have brakes, he said.
They only reached speeds around 30 miles per hour, But when brakes were introduced, cars achieved higher speeds.
And that's the difference security should make in our networks.
And that impact should be felt by user's devices applications and our traffic,
as you would trust, can help us go faster.
And I would try to flush that out with a battle card of sorts between traditional VPN
and these galas private access solution. During this course, which integrates zero trust
in its VPN replacement.
So zero trust is not an all in one
physical appliance or virtual machines supplied by a vendor.
But many security focused software and hardware vendors have adopted the zero trust model.
As you can see on the slide, the vendors very in terms of what they're known for.
Zero trust gonna be applied to firewalls. Web filtering service is
remote access and identity management fighters.
Later, wrong, we will discuss how's the scale. Er's software as a service solution and their private access technology can replace traditional VPN
and look at the benefits for the scale of private access in terms of zero trust and also the pit bulls we currently face with traditional VPN.
If we look back at some of the biggest breach is right. We know that VPN credentials provided to third party vendors or contractors
played a major role in financial damage and reputational damage for big organizations.
You know, back in 2013 Target was breached due to credentials stolen from an H back company
that was contracting to do work for them.
Home Depot suffered a similar fate in 2014 when vendor supplied log in credentials were stolen and then used to steal sensitive customer information.
So with us having a high level understanding of what zero trust networks are and are not, we will start to understand how the Zero trust model could be could have helped with breaches similar to Target and Home Depot and Sony and many others we have heard about on the news or read about online.
So quick recap on this section
we define zero trust networks. We looked at what zero trust Eriks are and what they are not.
And we look forward in the next section at the fundamentals that make up the zero trust model.
Thank you for being here. Stay tuned.
So welcome back. Just a quick pop quiz. Just a check. What we've learned so far,
a number one we've got Does zero trust place inherent trust and user's devices applications in traffic
number two, we have does zero trust see trust as a vulnerability and number three
was target face in a major breach in 2013 or 2014
And all of this week we covered in the last section defining zero trust
and just wanted to make sure that, um,
you know, you were able to
get a sense of
what it is that we're talking about, what it is we're discussing just to give you this quick learning check so we'll move on to those answers.
So for the first question, the answer is no. Zero Trust does not place an Aaron trust in user's devices applications in traffic.
Um, you'll probably get pretty familiar with the notion that zero trust networks never trust and always verify. Obviously, there's gonna be some trust that needs to be placed
on the user on the device, the application and the traffic, but not inherently. There's gonna be a lot of checks and balances when it comes to zero trust networks on number two. Does your trusty trust as a vulnerability? Yes, it does. The more trust we have in something, the more likely that we're not gonna see or detect.
ah, potential threat or malicious actor. So vulnerability, um,
in terms of trust is how zero trust sees it.
And then we have for our target major bridge. This happened in 2013.
Um ah. Company that size could potentially have breaches every year because they are
for such a big target, right? But the breach that I'm reference in happened in 2013 and we did touch on that as well in the last section.
Thank you for being here. Stay tuned.
3.1 The Big Fundamentals Part 1 - ZN
3.2 The Big Fundamentals Part 2 - ZN
3.3 Zscaler Integration with Zero Trust Part 1 - ZN
3.4 Zscaler Integration with Zero Trust Part 2 - ZN
3.5 Trust Management Part 1 - ZN