ZTA: Never Trust, Always Verify

Char Sample, Cragin Shelton, Sin Ming Loo, Connie Justice, Lynette Hornung, Ian Poynter

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Zero Trust Architecture (ZTA) deployments are growing in popularity, widely viewed as a solution to historical enterprise security monitoring that typically finds attackers months after they have gained system access. ZTA design incorporates multiple industry security advisories, including assuming network compromise, using robust identity management, encrypting all traffic, thwarting lateral movement, and other security best practices. Collectively, these features are designed to detect and prevent attackers from successfully persisting in the environment. These features each offer solutions to various ongoing security problems but individually are not comprehensive solutions. When designed for cloud services ZTA holds the promise of outsourcing security monitoring. However, some observations about ZTA suggest that the component solutions themselves have flaws potentially exposing systems to additional undetected vulnerabilities, providing a false sense of security. This paper addresses vulnerable paths using a bottom-to-top approach, listing problem areas and mapping them to attacker goals of deny, deceive, disrupt, deter, and destroy. The paper then addresses residual risk in the architecture. Based on the findings the paper suggests realistic countermeasures, offering insights into additional detection and mitigation techniques.

Original languageEnglish
Title of host publicationProceedings of the 21st European Conference on Cyber Warfare and Security, ECCWS 2022
EditorsThaddeus Eze, Nabeel Khan, Cryil Onwubiko, Cryil Onwubiko
Pages256-262
Number of pages7
ISBN (Electronic)9781914587405
StatePublished - 2022
Event21st European Conference on Cyber Warfare and Security, ECCWS 2022 - Chester, United Kingdom
Duration: 16 Jun 202217 Jun 2022

Publication series

NameEuropean Conference on Information Warfare and Security, ECCWS
Volume2022-June
ISSN (Print)2048-8602
ISSN (Electronic)2048-8610

Conference

Conference21st European Conference on Cyber Warfare and Security, ECCWS 2022
Country/TerritoryUnited Kingdom
CityChester
Period16/06/2217/06/22

Keywords

  • attack
  • component
  • system
  • vulnerabilities
  • zero trust architecture

Fingerprint

Dive into the research topics of 'ZTA: Never Trust, Always Verify'. Together they form a unique fingerprint.

Cite this