Resilient Zero Trust Frameworks for Continuity in Decentralized Networks


Posted on by Sanjay Poddar

From a security management perspective, organizations require to shift their methodology and adopt a zero trust model as they expand decentralization across their network. But if we house zero trust now, what happens if a breach takes place? That is why we use resilience planning to protect the continuity of services.

Why Resilience in Zero Trust Makes a Difference

Zero trust frameworks are based on the assumption of breach, verifying every access attempt as 'just minimal trust' it needs. As these decentralized networks have increased in complexity, so has the potential attack surface. Resilience is about becoming and unbecoming. When zero trust frameworks include resilience, they allow businesses to work through a compromise, stay operational, preserve levels of services while protecting data.4

Three Key Resilience Strategies for a Decentralized Zero Trust Network Model

1. Segmentation and Isolation throughout the Network

This is usually when zero trust brings micro-segmentation to a level of the attack. Segmentation (NIST SP 800-207, Zero Trust Architecture) is important for controlling lateral movement in a network, which helps to avoid spreading the breach within isolated segments. The organization then must segregate its resources more when a segment adjacent is in danger if they want to increase resilience. Limiting the spread of an infection in this way not only improves segmentation but can reduce how bad a security breach gets—containment is half the battle.

2. Identity and Access Management (IAM) on the Blockchain

The ability to manage identities and access remotely is crucial in a decentralized network. A resilient IAM system would tolerate partial outages through redundancy (e.g. multi-factor or adaptive risk-based access). If attackers compromise the IAM system, contingency systems must act to let verified users in and keep the business operational.

3. Distributed Data Backup and Secure Resilience

Resilient zero trust models include secure, immutable backups. Immutable storage means that even if cybercriminals encrypt data, you still have an untouched version of your data to recover. Geographically redundant, decentralized backups offer further protection against data integrity while ensuring a faster response in case of disaster recovery needs that are mission-critical for compliance and operational resumption. 

Monitoring and AI

A basic level of monitoring may be necessary but not sufficient for a resilient zero trust architecture. Many organizations leverage AI and machine learning technologies to give organizations real time anomaly detection, or response capabilities. For instance, analytics driven by AI could detect access requests that look strange and isolate affected systems while notifying IT personnel. This approach is much quicker and enables a proactive response helping to cut down the spread of potential breach.

The Secret of Every Future-Proof Zero Trust Network—Resilience

With the expanding nature of cyber threats, it is no longer a luxury to invest in zero trust frameworks without resilience. But sooner or later organizations must accept this chilling reality — whether a clever phishing campaign to trick users into revealing their credentials, human error around cloud settings that leave touching defenseless exposed server ports (like data ports allowing C2 traffic within EKS), well we all know the possibilities. Prioritizing continuity and resilience in the design of a Zero Trust network can help businesses weather disruptions, protect data, and cultivate trust with customers.

Contributors
Sanjay Poddar

Advanced Services Engineer, Fortinet

Security Strategy & Architecture

zero trust standards & frameworks network security security architecture identity management & governance Artificial Intelligence / Machine Learning

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs