Business & Technology

Zero Trust Security: Definition and Key Principles

By Peter Newton | February 18, 2020

Identify and Secure Users and Devices, On and Off Network

When network security is focused primarily on the perimeter, those attackers, malware, and infected devices that manage to bypass edge security checkpoints often have free access to the flat network or network segment inside. They can take their time to establish a beachhead, escalate privileges, spread laterally across the network, and identify and exploit the data and resources they want to steal, hijack, or destroy. Perimeter-focused security, combined with flat and open network environments are the reason why the average mean time to identify a threat is 197 days, with another 69 days required to contain a breach, usually because it has spread so far and deep into the network.

The common issue is one of trust. When you automatically extend trust to any device or user in your network, you put your organization at risk when either becomes compromised, whether intentionally or unintentionally. Fortinet’s Zero Trust Access framework specifically addresses this challenge by shifting the fundamental paradigm open networks built around inherent trust, to a zero trust framework through the adoption of rigorous network access controls.

The core assumption is that every device on your network is potentially infected, and any user is capable of compromising critical resources. With that new paradigm in place, organizations need to know exactly who and what is on their network at any given moment. Next, they need to ensure that those users and devices are only provided with the minimum level of network rights necessary for them to do their job. And finally, any resources they need should only be accessed on a “need to know” basis, regardless of their location or function.

What is Zero-Trust Access?

Zero trust security is the process of eliminating points of vulnerability by limiting network access for users, as well as adopting extensive identity verification, so that they only have access to the data and systems relevant to their position. The idea of zero trust is credited to John Kindervag, a Vice President and Principal Analyst at Forrester Research.

By moving away from a system that operates on implicit trust, CISOs can mitigate the risk posed by employees and more efficiently manage an organization’s network. This results in benefits such as:

  • Enhanced data protection – This is accomplished through the thorough vetting of any devices associated with your network.

  • Reduced complexity – A zero trust system is an end-to-end solution, allowing cybersecurity teams to eliminate redundant firewalls, web gateways, and other virtual and hardware security.

  • Lessened labor costs – Central zero trust systems make it simple to manage, monitor, secure, update, and refine your security controls, ensuring you won’t need an additional headcount.

Fortinet’s unique Zero Trust Access framework leverages a tightly integrated collection of security solutions to enable organizations to identify and classify all users and devices seeking network access, assess their state of compliance with internal security policies, automatically assign them to zones of control, and then continuously monitor them both on and off the network. Achieving this starts with three essential functions:

Key Principles Behind Zero Trust Access

There are three main principles behind Fortinet’s Zero Trust Access framework: Enhanced device visibility and segmentation, strong identity-based access controls, and the ability to secure endpoints on and off of your corporate network. 

Let’s take a closer look at how these principles help organizations and learn more about the technology backing Zero Trust Access.

1. Continuous Monitoring Through Device Visibility and Microsegmentation

Zero Trust Access strategies must establish a running inventory of all devices on the network. FortiNAC accurately discovers and identifies every device on or seeking access to the network, scans it to ensure that it hasn’t already been compromised, and profiles it to establish its role and function – whether an end user’s phone or laptop, a network server, a printer, or a headless IoT device such as an HVAC controller or security badge reader.

FortiNAC then uses dynamic network micro-segmentation to assign each device to an appropriate network zone based on a number of factors, including device type, function, and purpose within the network. It can also support Intent-Based Segmentation provided by a FortiGate next-generation firewall (NGFW) platform to intelligently segment devices based on specific business objectives, such as compliance requirements like GDPR privacy laws or PCI-DSS transaction protection. With Intent-Based Segmentation in place, assets are tagged with compliance restrictions that are enforced regardless of their location in the network, helping to reduce the time and cost of compliance implementation.

And finally, FortiNAC provides continuous monitoring and response for these devices. Those devices that begin to behave abnormally can be quickly identified, allowing FortiNAC to take a variety of countermeasures, such as reassigning them to a quarantine zone so they cannot achieve their objectives or infect other devices. 

2. Multi-Factor Authentication and Identity-Based Access

User identity is the other cornerstone of an effective Zero Trust Access strategy. The objective of Zero Trust Access is to determine who every user is and what role they play within an organization and then establish a “least access policy” that only grants users access to resources necessary for their role or job, with access to additional resources only provided on a case-by-case basis. 

Tools like FortiToken, for two-factor authentication, and FortiAuthenticator for AAA services, access management, and single sign-on (SSO) are used to identify and apply appropriate access policies to users based on their role within the organization. They also support SAML implementations to exchange authentication and authorization data between parties, enabling users to securely access SaaS solutions such as Salesforce, ADP, or Office365.

User identity can be further authenticated through such things as user log-in, multi-factor input, or certificates, and then tied to role-based access control (RBAC) to match an authenticated user to specific access rights and services. 

3. Endpoint Protection for On and Off-Network Devices

Monitoring assets that remain on the network is pretty straightforward. The challenge is that many of them are mobile, including BYOD devices owned by employees. They serve multiple purposes for their users, bridging their personal and business lives. They are used to browse the internet, interact on social media sites, and receive personal and business emails when not logged into the network – which means they are often exposed to threats that can be dragged back into the network, exposing other devices and resources to risk.

According to one Ponemon Institute report, 63% of companies are unable to monitor off-network endpoints, and over half can’t determine the compliance status of endpoint devices. When you combine that with Gartner’s warning that 30% of breaches involve insiders (whether or not they are malicious), it is imperative that endpoint devices that have access to critical network resources are also protected when they are off-network.

Zero Trust Access addresses the challenge of off-network devices with client- and cloud-based solutions. FortiClient, including the Fabric Agent, combined with cloud-based FortiGuard Cloud, provides continuous endpoint protection to prevent device compromise whether on or off the network. It also enables secure remote access to networked resources via VPN connectivity, scanning of traffic, URL filtering, and sandboxing while also sharing endpoint security status as part of the authentication and authorization process. This includes endpoint telemetry such as device OS and applications, known vulnerabilities, and patches, as well as security status to refine the access rules applied to the device. 

The Advantages of Implementing a Zero Trust Access Strategy

By transitioning to a Zero Trust Network Access framework that identifies, segments, and continuously monitors all devices, organizations can replace their high-risk, flat networks to ensure that internal resources remain secured, and that data, applications, and intellectual property remain protected. This strategy not only reduces many of the risks an organization faces due to a perimeter-centric security strategy, but also magnifies visibility and control across the organization – including off-network devices – while simplifying overall network and security management.

Don’t miss Fortinet’s upcoming global virtual event for cybersecurity and networking professionals to learn more about our latest product announcements. Sign up here.

Engage in our Fortinet user community (Fuse). Share ideas and feedback, learn more about our products and technology, or connect with peers.

Find out how Fortinet’s Security Fabric delivers broad, integrated, and automated protection across an organization’s entire digital attack surface from IoT to the edge, network core and to multi-clouds.  

Find out how Echoenergia and New Zealand Red Cross used Fortinet’s Security Fabric for end-to-end network protection.