Cyber threats are ever evolving and hackers are getting more sophisticated; adopting newer techniques ranging from social engineering attacks to APTs (Advanced persistent threats), malicious threat actors seeking to gain unauthorized access to networks and systems, or exfiltrate sensitive information that could result in operational, financial and reputational damages to any organization. This article focuses on what zero-trust architecture is, or in other words, a security-focused approach explained in a simple enterprise architecture view point, and how it can help in curbing the above-mentioned risks by imposing access validation and control at every layer.
Conceptual representation of a zero-trust model
The fundamental principle behind zero-trust architecture is tailored behind one key principle i.e. deny by default and allow only if authenticated and on a ‘need to know’ basis. Additionally, continue to monitor for anomalies, and where possible, remove human intervention.
Fig 1: Target Network posture
The core of the architecture that delivers the zero-trust is the centralized control pane (in the above diagram the policy engine). Fundamentally, this transforms the traditional model from a full mesh (any to any) type of configuration to a typical hub-and-spoke model where the control pane is centralized. The benefit of this approach is the visibility, ease of administration and control. Rules are defined at the policy engine that enables this journey to a zero-trust architecture. Every request to access is now validated at the centralized control pane and access is granted or denied based on access rules that are continuously monitored for every event.
Let us look at a use case where Wipro was engaged as a consulting partner to enable the transformation to zero-trust model. The client was a large utilities organization in the UK that had multiple business units and each one of them carrying a varied risk appetite. So, one common security policy was not sufficient to control and govern the security posture. Containment of risk was the paramount consideration in this case. Wipro’s vast experience and knowledge -- both from an enterprise architecture perspective and from a security architecture perspective -- about the current landscape of the customer combined with industry experience and technology expertise was very crucial to devise the strategic architecture.
The journey of successful implementation of zero trust architecture requires meticulous planning that consists of four important steps:
The following section highlights the capability architecture (Enterprise architecture view) that enables a zero-trust model
Fig 2: Capability architecture
The most critical building block in the above diagram is ‘the process layer’ that consists of 5 key processes:
Capability architecture defines the underpinning technology layers that can enable a fully functional zero-trust architecture. It is vital to strengthen the capabilities that can support the objective of the five pillars. A good starting point is to perform a capability maturity assessment that looks at people, process, policy framework and technology perspective as to what is the current state within an organization and build the target state in a modular fashion.
Fig 3: Capability maturity assessment
Summary
Zero-trust model is the way forward for organizations that are banking on it as a security measure to identify, detect, protect and contain access risks that could potentially result in breaches. Fundamentally, the model equips organizations to validate every access request and permit or deny based on business rules. In principle, it is important to identify the data, assets, map dependencies and create rules.
A meticulous approach to enable successful implementation of the zero-trust model is to look at it from a people, process, policies and technology perspective. However, it is also important to highlight the importance of the changing dynamics of the IT landscape in any organization that really calls out for an automated approach to discover assets, design and implementation.
Shivakumar Ramachandran
Principal Consultant, Wipro Limited.
Shivakumar Ramachandran MBCS, CISSP, TOGAF is a Principal Consultant with Wipro's modern application services: consulting practice and possesses a wealth of experience working on strategy and architecture engagements as an enterprise architect, enterprise security architect, in digital consulting and cloud computing, for clients across UK and Europe.
Wipro automates enquiry gathering to project closure process of WCCLG and streamlines project pipeline tracking via Oracle Sales Cloud
Wipro partnered with a global specialist in energy management and automation to put together a centralized, multi-level governance model for IT systems.
Wipro enables securing the banking infrastructure by providing end to end network security and Privileged Event Monitoring for one of the largest banks in the United States of America
© 2022 Wipro Limited |
|
© 2022 Wipro Limited |
Pharmaceutical & Life Sciences