Zero Trust Security Model
Zero Trust Security Model
Current Trends
April 18, 2019
American Council for Technology-Industry Advisory Council (ACT-IAC)
The American Council for Technology (ACT) is a non-profit educational organization established
to create a more effective and innovative government. ACT-IAC provides a unique, objective,
and trusted forum where government and industry executives are working together to improve
public services and agency operations through the use of technology. ACT-IAC contributes to
better communication between government and industry, collaborative and innovative problem
solving, and a more professional and qualified workforce.
To maintain the objectivity and integrity of its collaborative process, ACT-IAC does not accept
government funding.
ACT-IAC welcomes the participation of all public and private organizations committed to
improving the delivery of public services through the effective and efficient use of technology.
For additional information, visit the ACT-IAC website at www.actiac.org
Disclaimer
This document has been prepared to contribute to a more effective, efficient, and innovative
government. The information contained in this report is the result of a collaborative process in
which a number of individuals participated. This document does not – nor is it intended to –
endorse or recommend any specific technology, product, or vendor.
Moreover, the views expressed in this document do not necessarily represent the official views
of the individuals and organizations that participated in its development. Every effort has been
made to present accurate and reliable information in this report. However, ACT-IAC assumes no
responsibility for consequences resulting from the use of the information herein.
Copyright
©American Council for Technology, 2019. This document may not be quoted, reproduced
and/or distributed unless credit is given to the American Council for Technology-Industry
Advisory Council.
For further information, contact the American Council for Technology-Industry Advisory Council
at (703) 208-4800 or www.actiac.org.
2
Table of Contents
Executive Summary ................................................................................................................... 1
Figure 4 - Control and Data Plane Functionality Within the Zero Trust Architecture ...........12
Credits ......................................................................................................................................25
Glossary....................................................................................................................................27
References ...............................................................................................................................29
3
Executive Summary
Recent advances in technology create many opportunities to significantly modernize
government services to catch up with private sector capabilities and citizens’ expectations. The
proliferation and continuation of serious cybersecurity incidents demonstrate that current
approaches to protecting government systems and data are inadequate. Today’s systems are
expanding and evolving into mobile and cloud-enabled environments that stretch traditional
perimeter-based cybersecurity approaches to the breaking point. Unless these deficiencies and
challenges are addressed effectively and expeditiously, the government will be unable to
properly protect our national assets and realize the potential benefits technology advances offer.
Clearly, new and more effective approaches to cybersecurity are required. One new approach,
known as “Zero Trust (ZT)”, has the potential to substantially change and improve agencies’
abilities to protect their systems and data. ZT is a security concept anchored on the principle that
organizations need to proactively control all interactions between people, data, and information
systems to reduce security risks to acceptable levels.
Despite increasing budget challenges, an overtaxed workforce, and difficulties recruiting and
retaining qualified talent; agencies are still expected to modernize their aging cybersecurity
architectures to address new threats and service requirements. ACT-IAC was asked by the
Federal CIO Council to assess the maturity of ZT technologies, their readiness and suitability for
use in government, and the issues agencies would face if they chose to pursue ZT. This report
provides the results of that assessment.
1. Segregate users, devices, data, and services, within a trust framework, to ensure every
access request is validated and deliberately permitted or disapproved;
2. Be resistant and resilient to attack without a large administrative burden; and
3. Be able to easily and rapidly (if not automatically) adjust to an ever-changing service
environment also without a large administrative burden.
ZT satisfies these characteristics by treating all users, devices, data, and service requests the
same. It shifts from the traditional security policy of all assets in an organization being open and
accessible to requiring continuous authentication and authorization for any asset to be
accessible. This fundamental change is the essence of ZT. ZT is not a thing you buy, it is a
security concept, strategy, and architectural design approach.
During the course of our work, we found that ZT solutions are widely available and currently in
use in the private sector. Many companies are developing new capabilities and solutions to
support ZT and there is healthy competition in the marketplace. We observed that no single,
holistic ZT solution is currently available from a single vendor. Acquiring a comprehensive
solution would require integration of multiple vendors’ products and services. Many companies
have established strategic partnerships and agreements with other companies to offer more
1
comprehensive, integrated, and interoperable solutions. We also found that several different ZT
architecture approaches are available for agencies to choose from.
Project Background
In May, 2017, the President established the American Technology Council (ATC) to promote the
secure and efficient use of IT across the federal government and directed it to produce a report
on modernizing federal IT. The IT Modernization Report2, published later in 2017, and
associated Executive Order 2, will enable agencies “…to move from protection of their network
perimeters and managing legacy physical deployments toward protection of Federal data and
cloud-optimized deployments.” It acknowledges that success in this effort requires new
approaches and strategies; not only in applied technology, but also in legal, policy, resource
allocation, acquisition, and workforce areas.
In May 2018, the Federal CIO Council Services, Strategy, and Infrastructure Committee asked
ACT-IAC to undertake a project related to zero trust (ZT) and potential federal agency adoption.
Concurrently, federal agencies initiated a transition of network services from the current General
Services Administration (GSA) Networx contract to the new Enterprise Infrastructure Solutions
(EIS) contract by March 2023. The federal government has a unique opportunity to capitalize
1 Doherty, N. F., Ashurst, C., & Peppard, J. (2012). Factors affecting the successful realisation of benefits
from systems development projects: Findings from three case studies. Journal of Information Technology,
27(1), 1-16. doi: http://dx.doi.org.library.capella.edu/10.1057/jit.2011.8
2https://itmodernization.cio.gov/assets/report/Report%20to%20the%20President%20on%20IT%20Modern
ization%20-%20Final.pdf
2
on the confluence of IT modernization and EIS transition to profoundly transform agencies’
network service delivery and data protection.
ACT-IAC established a project team of government and industry volunteers primarily from its
Networks and Telecommunication and Cybersecurity Communities of Interest. Their work was
designed to assess the technical maturity and availability for procurement of ZT technologies
and services and identify and address other important issues related to potential federal agency
adoption.
The project focused on two work-streams. The first work-stream assessed what practical tools
are available in the marketplace to support ZT and identified notional capabilities that are not yet
procurable. Market research focused on assessing technology maturity and readiness, fitness
for use, scalability, and affordability based on actual implementations. This included
presentations and demonstrations by six companies (Cisco, Duo, Palo Alto, Zscaler, Fortinet,
and Cyxtera) that already provide elements of ZT in their products and services to the
commercial and public sectors. The second work-stream focused on trust algorithms. These
dynamic algorithms are used to generate trust scores that are essential to comprehensive ZT
solutions. Trust scores are used to grant, limit, or deny access based on defined criteria. The
project team developed an understanding of the existing body of work on trust algorithms to
advise federal agencies on this topic.
Other potential areas of study identified in early discussions, including implementation and
policy issues and pilot projects, are outside the scope of this report. ACT-IAC may undertake
additional work to address those issues in the future if requested.
Most existing corporate networks are flat – i.e. there is little or no separation of data and user
networks. That weakness of the traditional hub-and-spoke network model lies in its
3Fifth-generation
(5G) is the latest iteration of cellular technology engineered to greatly increase the
speed and responsiveness of wireless networks.https://searchnetworking.techtarget.com/definition/5G
3
architecture. Crossing the chasm from trust to distrust via a firewall is inherently risky. Instead,
Zero Trust no longer distinguishes between “inside” and “outside” the network perimeter.
4
Figure 1 - Six Pillars of a Zero Trust Security Model
Mission Focus
Ensuring that mission program and executive leaders understand the need for and support Zero
Trust capabilities will help ensure a successful implementation. IT capabilities exist within the
organization to enable the mission and do not exist for their own sake. This logic extends to
Zero Trust. The need for information protection should be driven by the mission with fulfillment
by the IT organization. IT organizations should work with the mission and senior leadership to
garner support and champions to create an organizational requirement for Zero Trust.
Data Foundation
The purpose for a Zero Trust architecture is to protect data. A clear understanding of an
organization’s data assets is critical for a successful implementation of a zero-trust architecture.
Organizations need to categorize their data assets in terms of mission criticality and use this
information to develop a data management strategy as part of their overall ZT approach.
5
Pillar #1 - Users
People/Identity Security
Ongoing authentication of trusted users is paramount to ZT. This encompasses the use of
technologies like Identity, Credential, and Access Management (ICAM) and multi-factor
authentication and continuously monitoring and validating user trustworthiness to govern their
access and privileges. Technologies for securing and protecting users’ interactions, such as
traditional web gateway solutions, are also important.
Pillar #2 - Devices
Device Security
Pillar #3 - Network
Network Security
Some argue that perimeter protections are becoming less important for networks, workflows,
tools and operations. This is not due to a single technology or use-case, but rather a
culmination of many new technologies and services that allow users to work and communicate
in new ways. Zero Trust Networks are sometimes described as “perimeterless”, however this is
a bit of a misnomer. Zero Trust Networks actually attempt to move perimeters in from the
network edge and segment and isolate critical data from other data. The perimeter is still a
reality, albeit in much more granular ways. The traditional infrastructure firewall perimeter
“castle and moat” approach is not sufficient. The perimeter must move closer to the data in
concert with micro-segmentation to strengthen protections and controls.
Network security is expanding as agencies grow their networks to partially or fully transition to
Software Defined Networks, Software Defined Wide Area Networks and internet-based
technologies. It is critical to (a) control privileged network access, (b) manage internal and
external data flows, (c) prevent lateral movement in the network, and (d) have visibility to make
dynamic policy and trust decision on network and data traffic. The ability to segment, isolate,
and control the network continues to be a pivotal point of security and essential for a Zero Trust
Network.
Pillar #4 - Applications
Application and Workload Security
Securing and properly managing the application layer as well as compute containers and virtual
machines is central to ZT adoption. Having the ability to identify and control the technology
stack facilitates more granular and accurate access decisions. Unsurprisingly, multi-factor
authentication is an increasingly critical part of providing proper access control to applications in
ZT environments.
6
Pillar #5 - Automation
Security Automation and Orchestration
Harmonious, cost effective ZT makes full use of security automation response tools that
automate tasks across products through workflows while allowing for end-user oversight and
interaction. Security Operation Centers commonly make use of other automated tools for
security information and event management and user and entity behavior analysis. Security
orchestration connects these security tools and assists in managing disparate security systems.
Working in an integrated manner, these tools can greatly reduce manual effort and event
reaction times and reduce costs.
Pillar #6 - Analytics
Security Visibility and Analytics
You can’t combat a threat you can’t see or understand. ZT leverages tools like security
information management, advanced security analytics platforms, security user behavior
analytics, and other analytics systems to enable security experts to observe in real time what is
happening and orient defenses more intelligently. The focus on the analysis of cyber-related
event data can help develop proactive security measures before an actual incident occurs.
Privacy Concerns
It is very important to integrate privacy into ZT architecture designs and lifecycle processes.
Privacy concerns around IT investments are increasing as we push computing to "the edge"
resulting in an increasingly complex world of interconnected information systems and devices.
The full integration of privacy controls into the security control catalog is a primary objective of
the next generation of the NIST SP 800-53 (rev 5) security and privacy control standards. ZT
implementations will likely have new and different approaches to monitor user behavior and/or
track user identity. ZT practitioners need to ensure they comply with applicable privacy laws,
4
https://www.forrester.com/report/The+Zero+Trust+eXtended+ZTX+Ecosystem/-/E-RES137210
5 https://www.gartner.com/smarterwithgartner/the-gartner-it-security-approach-for-the-digital-age/
7
regulations, standards, and policies. Success in this area can be best achieved by closely
coordinating design and development efforts with agency privacy officers. It is especially
important to make sure that all ZT implementations have appropriate disclosures in agency
privacy impact assessments (PIAs) as required by section 208 of the E-Government Act of
20026. For additional information on managing privacy risk, please refer to NISTIR 8062, "An
Introduction to Privacy Engineering and Risk Management in Federal Systems”. 7
BeyondCorp is based on the original Zero Trust premise that traditional perimeter-based
security is not sufficient to protect internal networks and data. Also, Google recognizes and
promotes the growth of cloud technologies and moving applications from on-premise data
centers to cloud-provided applications and services. Several principles are essential to
BeyondCorp’s Zero Trust approach:
● Connecting from a particular network must not determine which services you can
access.
● Access to services is granted based on what we know about you and your device.
● All access to services must be authenticated, authorized and encrypted.
Additionally, Google BeyondCorp identifies the following components that can be mapped to the
Zero Trust pillars listed above:
● Single sign-on
● Access proxy
● Access control engine
● User inventory
● Device inventory
● Security policy
● Trust repository
6 https://www.govinfo.gov/app/details/PLAW-107publ347
7 https://nvlpubs.nist.gov/nistpubs/ir/2017/NIST.IR.8062.pdf
8 https://cloud.google.com/beyondcorp/
8
● User inventory
● Device inventory
● Security policy
● Trust repository
The components are delivered as part of the Google Cloud Platform with many being delivered
by Google Integrated Access Proxy. Since this is a cloud-only delivery strategy, the use of
virtual software based solutions to compliment the use of a Software Defined Perimeter is
necessary. Applications are migrated to the cloud where granular access controls can be
delivered. This eliminates the need to grant applications access into the Google intranet.
Google uses a proxy-based approach which acts as the enforcement point to control access to
hosted applications that are delivered on the Google Cloud Platform. This proxy approach has
been refined and is being delivered as the Cloud Identity-Aware Proxy offering that controls the
essential pillars of Zero Trust.
9
Establishing Trust is Foundational
As a framework, Zero Trust implies innate distrust ("default deny”) requiring an adaptive
deployment model that emphasizes continuous monitoring and assessment. Dynamic, context-
sensitive trust extension limits access based on whatever threshold credentialing policies
assign. One of the first questions in this trust-centric shift is “How do we determine how
trustworthy something is?” Many security organizations struggle to answer this question.
Traditional programs assume all data and transactions are trusted and that compromises, loss
of data, malicious actors, etc. would degrade that trust. Zero Trust flips the trust calculation by
assuming all data and transactions are untrusted from the outset. The new question is “How do
we gain sufficient trust?” While some key concepts and components can be applied to all
deployments, there is no set formula that can be applied across every organization. Trust will
change depending on the organizations’ needs and focus. Zero Trust environments integrate
controls for data, users, devices and apps to manage the trustworthiness of all transactions
(refer to Figure 3).
10
Trust Engine is a technology used to dynamically evaluate the overall trust of a user, device, or
application in the network by giving it a trust score. The trust engine uses the calculated trust
score to make policy-based authorization decisions for each transaction request.
Trust Score is a value calculated from factors and conditions, either pre-defined or selected by
the organization, used to determine the trustworthiness of a given user, device, or application.
Information like location, time of day, length of access, and action taken are examples of
potential factors for determining the trust score.
Within the Zero Trust Triangle, the Trust Engine evaluates the trustworthiness of any agent that
enters the network via the use of a trust score. Agent, or “Network Agent”, is the term given to
the combination of data known about the actors in a network request, typically containing a
user, application, and device. This combination of data is queried on demand in real-time to
provide situational context to make the best authorization decisions possible. After the trust
score is computed, the user, application, device, and score are bonded to form an agent. Policy
can then be applied against the agent in order to authorize the request.
Zero Trust architecture is based on the Control Plane/Data Plane model (see Figure 4). The
control plane is made up of components that receive and process requests from data plane
devices that wish to access (or grant access to) network resources9. Almost everything else
within the Zero Trust architecture is referred to as the data plane, which the control plane
coordinates and configures. The data plane contains all of the applications, firewalls, proxies,
and routers that directly process all traffic on the network.10
The architecture illustrated in Figure 4 supports requests for access to protected resources that
are first made through the control plane, where both the device and user must be authenticated
and authorized. Fine-grained policy can be applied at this layer, perhaps based on role in the
organization, time of day, or type of device. Access to more secure resources can additionally
mandate stronger authentication. Once the control plane has decided that the request will be
allowed, it dynamically configures the data plane to accept traffic from that client (and that client
only). In addition, it can coordinate the details of an encrypted tunnel between the requester
and the resource. This can include temporary one-time-use credentials, keys, and ephemeral
port numbers. While some compromises can be made on the strength of these measures, the
basic idea is that an authoritative source, or trusted third party, is granted the ability to
authenticate, authorize, and coordinate access in real time, based on a variety of inputs.11
9 Sourced from :Zero Trust Networks, Evan Gilman & Doug Barth, ISBN: 978-1-491-96219-0
10
Sourced from: Zero Trust Networks, Evan Gilman & Doug Barth, ISBN: 978-1-491-96219-0
11
Sourced from: Zero Trust Networks, Evan Gilman & Doug Barth, ISBN: 978-1-491-96219-0
11
Figure 4 - Control and Data Plane Functionality Within the Zero Trust
Architecture
The richness of information contained within the agent allows very flexible yet fine-grained
access control, which can adapt to varying conditions by including the score component in
policies. If the request is authorized, the control plane signals the data plane to accept the
incoming request. This action can configure encryption details as well. Encryption can be
applied to data at rest and data in motion at the device level, application level, or both. At least
one is required for confidentiality.
With these authentication and authorization components, and the aid of the control plane in
coordinating encrypted channels, the zero trust model can assert that every single flow on the
network is authenticated and expected. Hosts and network devices can drop traffic that has not
had all of these components applied, significantly reducing the likelihood of sensitive data leaks.
Additionally, by logging each of the control plane events and actions, network traffic can be
easily audited on a flow-by-flow or request-by-request basis.
12
Benefits Of Zero Trust
When evaluating the move to a Zero Trust architecture, both technical and business leaders
within an organization must see the potential benefits. Core ZT outcomes should be focused on
creating more secure networks, making data safer, reducing negative impacts from breaches,
improving compliance and visibility, achieving lower cybersecurity costs, and improving the
overall risk posture of the organization. The benefits realized depend on the degree to which ZT
principles are deployed and on the operational model used. Lost or stolen data, exfiltrated
intellectual property, and other types of breaches cost organizations money and reputations.
Avoiding such occurrences is key to a successful ZT adoption.
There are, however, challenges associated with implementing ZT’s stringent network,
application, and data access rules. First, strong identity management and authentication tools
must be properly configured and re-examined on a continual basis. User profiles must be kept
current and trust algorithms carefully designed to facilitate proper access and usage rights.
Second, users may find that access to critical data and systems is put under strict scrutiny and
may be more time consuming than what they were accustomed to.
Recent trends associated with the move to cloud computing and the increase of “Internet-of-
Things” devices have broadened the edge of the network. This can create opportunities for
data to be manipulated, so extending protection for data as it moves around interconnected
networks is important. ZT approaches stress identifying high value data and prioritizing
protections for it. Protecting data with network segmentation can help avoid “brick” attacks
13
(deleted data), and in turn, can keep the data integrity high and reduce the likelihood of costly
remediation lawsuits.
A key challenge associated with new data architectures that create encrypted data vaults is that
they spread data around hybrid cloud environments requiring varying levels of authentication.
These approaches may produce unacceptably long wait times for users to access their data.
This requires careful data architecture planning and data categorization decisions that are
grounded in solid risk management decisions.
State-funded hackers are well trained and resourced and persistent. There is sufficient
evidence that many nation states have offensive cyber capabilities which are full-time jobs. The
use of new tactics, techniques, and procedures, like artificial intelligence and machine learning
combined with state-level exploit code (e.g., Eternal Blue), is growing exponentially. This can
overwhelm a vulnerable organization’s security operations team with more incidents than they
can possibly address. It can also enable attackers to move laterally within a compromised
organization with previously unseen speed and accuracy. Any new security capability must be
resilient to the new reality and effectively lower both the external (Internet-discoverable) and
internal (insider threat) attack surfaces.
Zero Trust addresses both of these issues in a similar, unbending manner: deny access to any
service or data without sufficient authentication. In a standard current network design, a
network agent is commonly granted access after working through a two-factor process of
producing a memorized password and a token code or hardware authenticator. Adding ZT
components, associated with a behavioral trust score, location ID, and micro-segmentation,
would strengthen the decision of whether to allow an agent onto the network. Once on the
network, it would prevent the ability to roam to unauthorized areas. Combining ZT capabilities
with traditional tools like next-generation firewalls, data-loss prevention, and behavior heuristics
can further strengthen the network.
14
Reduced Impact from Breaches
Implementing a ZT architecture will reduce the impact of breaches due to the segmentation of
the network and the fact that users are given limited access. Smaller impacts from a breach will
reduce business disruption and keep remediation costs low. A smaller impact from a breach
can help maintain an organization’s reputation and trust by its customers and stakeholders.
Segmentation is the key technology to limit the area impacted from a breach. Limiting access to
only areas of the network where individual users need to go helps reduce the impact of
breaches.
The challenge is to do provide adequate network segmentation to improve security layer while
avoiding detrimental impacts to network performance, application performance, and business
workflow needs. Access controls remain essential, but they must be reinforced with strong
identification and authentication management practices, policies, and tools.
There are certainly challenges in implementing strong network segmentation practices and
getting CISOs to accept re-use of common templates for similar network segmentations. In
addition, audit entities (internal and external) need to be on-board with smaller, targeted audits
of segment networks and understand the interdependencies that exist.
As with all technology changes, the challenge associated with demonstrating higher return-on-
investment and reduced overall cybersecurity costs is the time required to deliver results. Some
15
costs can be reduced relatively quickly while others require more time. Organizations should
consider the following:
None of the companies ACT-IAC invited to participate in this project identified a single,
comprehensive Zero Trust solution. They work with other companies that offer complementary
capabilities to provide complete solutions. It is important to ensure the right approach is chosen
early in the planning stage. In choosing a specific ZT solution, decisions must balance security
and costs and be able to solve both today’s and tomorrow’s challenges. Zero Trust can provide
a mature solution today that does not need to add operational complexity or require major
architecture changes. In fact, it can simplify operations while increasing security and protecting
critical, high value assets.
The abilities to see and verify who has access to applications and data and ensure that trusted
traffic has not been compromised is critical. Solutions should be able to analyze allowed traffic
for active threats, malware, viruses, compromised credentials and restricted sensitive data.
Behavioral analytics and automation can be applied to consolidated logging to stop hidden bad
actors from appearing to be trusted. Zero Trust is about using the pillars for granular, limited,
and validated access control. A common framework will allow these pillars to work in unison
while reducing complexity through integration and strategic partnerships.
Zero Trust Networking transitions don’t have to happen all at once. A ZT maturity model can
help guide organizations embarking on a Zero Trust journey. The model can help organize,
track, and communicate the work being done. These models can be customized to account for
where the effort begins and track progress across the major milestones. Figure 5 contains an
example of a maturity model:
16
Figure 5 - Example of Zero Trust Maturity Model
17
As Gartner Research's Neil McDonald writes in his December 2018 report "Zero Trust Is an
Initial Step on the Roadmap to CARTA12,"…most enterprise data centers are isolated from
public networks and separated from end-user hardware. As with end-user access to the public
internet, access to a data center is granted based on trust...trust typically established by
validation of an IP address. In a data center, proprietary enterprise information and applications
are stored laterally. That flat hierarchy means that if a bad actor infiltrates the data center, all
information is at risk.” As McDonald notes, "An attacker that gains a foothold on one server can
easily spread laterally (east/west) to other systems." That kind of lateral movement is a
common vector for threats to spread – consider the recent Cryptolocker and Petya malware
infections.
Another option is the use of a Software-Defined Perimeter (SDP) to enable access without
sacrificing security. With SDP, users, regardless of whether they are inside or outside the
network, connect directly to resources, whether they reside in the cloud, in the data center, or
on the internet; all without connecting to the corporate network. SDP security software
establishes a secure perimeter around each user's network traffic – creating a network of one,
so to speak. As an example, Google employs its own SDP for employees called BeyondCorp.
With agencies aggressively moving to more evolving network models, it is no longer efficient to
backhaul traffic through central locations just to access increasingly mobile data from
12https://www.gartner.com/doc/3895267/zero-trust-initial-step-roadmap
13https://www.networkworld.com/article/3247672/virtualization/what-is-microsegmentation-how-getting-
granular-improves-network-security.html
18
increasingly mobile locations. With the evolving and expanding structure of government
networks, the Internet, a network not controlled by agencies, has become the new network that
is used to access data. New technologies need to be used to help agencies maintain control
and visibility over the increasing number of connections and transports for data, e.g.
technologies such as SDP. Users (or an SDP host) cannot initiate or accept communication
with another SDP host until after connecting to an SDP Controller that authorizes the
transaction. A key concept in SDP approaches is the SDP Controller instructions to SDP hosts
removes the need for DNS information and port visibility to the “outside” effectively “cloaking” or
creating an invisible “dark” network to outsiders.
SDP represents an approach to cybersecurity that creates a protective barrier around high value
enterprise applications and data access. This technology, and others like it, can protect
application infrastructure against existing and newly emerging cyber threats. For example,
existing attacks such as credential theft and server exploitation are blocked dynamically as
these technologies only allow access from devices registered to authenticated users which is a
key Zero Trust element.
SDP capabilities can be successfully delivered in different ways, e.g. via an agent, in-line
software, as a cloud service, and in some cases, even on-premise. SDP comports with Zero
Trust by maintaining a default-deny posture for every transaction. Policy is defined by user and
context (typically including behavioral analytics), reducing risk below that of micro-segmentation
alone. The risk of unauthorized lateral movement is eliminated because all transactions are
assessed the same way they occur inside or outside the enterprise firewall.
SDP enables authenticated users to access authorized applications and data running in any
environment without placing the users on the network or exposing private applications to the
internet. Any technology being explored for Zero Trust networks should support the following
essential principles:
maintaining authentication
dynamic authorization and trust, and
constant visibility.
19
Challenges to Zero Trust in the Federal Government
As noted, Zero Trust is a security strategy that is comprised of elements that are very much in
use today in the federal space. Nevertheless, there are challenges in deploying and operating
any new technology. There are also challenges which are unique to specific operating
environments. The challenges in the federal government are due in part to a combination of its
size, maturity, and dependencies. How they affect deploying and operating a ZT solution is
addressed below.
The largest operational challenge to deploying successful ZT solutions across the federal
government is the general lack of cybersecurity maturity. Most federal agencies lack the
fundamentals (e.g. agency policies, processes, and tools) requisite to undertaking a ZT
deployment. This is evidenced by the Federal Cybersecurity Risk Determination Report14 (May
18, 2018) which identified, among other things, a general lack of standardized IT capabilities
and network visibility. These factors alone create an operational challenge which can delay a
successful ZT implementation by months or even years as agencies struggle to work through
basics like application and server inventory. Adopting a ZT maturity model approach to
implementation can help address critical capabilities needed to successfully and more rapidly
address roadblocks and move agencies into increasingly mature cybersecurity postures.
There are over one hundred small federal agencies that face another operational challenge.
Zero Trust can augment an organization’s existing suite of cybersecurity tools but it will not
replace them. Most small agencies lack the budget and IT security expertise necessary to
achieve compliance with the myriad cybersecurity and risk management requirements. Even if
they have a solid grasp on policies, processes, and tools, unless an external organization (e.g.
DHS, GSA’s Centers of Excellence, etc.) provides assistance and support, Zero Trust is unlikely
to be implemented in many small agencies. Complicating the issue, centrally-provided security
services are often too expensive for small agencies to afford.
14https://www.whitehouse.gov/wp-content/uploads/2018/05/Cybersecurity-Risk-Determination-Report-
FINAL_May-2018-Release.pdf
20
information which may not have been previously required. Agencies unfamiliar or unprepared to
support a partner agency ZT deployment may add unforeseen delays.
Centralized service providers who are prepared can quickly and easily transfer required
information, but ZT deployments may also experience complications where there are multiple
dependencies. This can be especially impactful with large-scale extra-agency dependencies
which are highly regulated (e.g., financial and health sectors). Lastly, these dependencies are a
two-way street: as private-sector partners move to ZT solutions, federal agencies can expect to
support requirements. In all cases, communicating early and often with service providers,
partners, and customers will go a long way in overcoming these challenges.
Use Case #1 - Cloud: These sets of (growing) TIC Use Cases cover some of the most
prevalent cloud models used by agencies today. These include:
21
d. Platform as a Service (PaaS)
The use of ZT can fit into either the Software as a Service (SaaS) or within an established
Platform as a Service (PaaS) categories of cloud services. Any ZT cloud based functionality
that is FedRAMP certified can be developed for an approved TIC 3.0 use case #1 application.
Use Case #2 - Agency Branch Office: This use case assumes that there is a branch office of
an agency, separate from the agency headquarters (HQ), which utilizes HQ for the majority of
their services (including generic web traffic). This case supports agencies that want to enable
SD-WAN technologies. An SD-WAN connection to a ZT FedRAMP approved SaaS Cloud
application is a good fit for this defined TIC 3.0 use case.
Use Case #3 - Remote Users: This use case is an evolution of the original FedRAMP TIC
Overlay (FTO) activities. The use case demonstrates how a remote user connects to the
agency’s traditional network, cloud, and the Internet using government furnished equipment
(GFE). A FedRAMPed ZT solution is a good fit for this DHS defined TIC 3.0 case
GSA SCHEDULE 70
This long running contract has been a solid option for years and has served the government
well. Agencies can procure a wide array of ZT components through Schedule 70 to include a
focused listing of cyber offerings under “Highly Adaptive Cybersecurity Services” SIN 132-45.
There seems to be enough flexibility with Schedule 70 to buy products, services, or any
combination. Of course, it is recommended that agencies verify any procurement approach with
their internal, expert contract and procurement teams before proceeding.
Some agencies may choose to deploy components of ZT as part of their transformation and
modernization efforts via the GSA Enterprise Infrastructure Solutions (EIS) vehicle. Although no
22
specific or named ZT services appear to be listed on EIS, GSA was forward-thinking with the
offering of three contract line item number (CLIN) types to accommodate agency-specific
requirements: Individual Case Basis (ICB) CLINs, Task Order Unique CLINs (TUCs), and
Catalog CLINs. These CLIN types offer the flexibility to customize Agency needs and bundle
standalone components together into more of a “solution”.
Agencies seeking even more options could consider other potential contract vehicles including
DHS Continuous Diagnostics & Mitigation (CDM), NASA SEWP 5, STARS II, and Alliant II
(expiring soon!). Whichever contract vehicle an agency selects, consideration should be made
for availability of products, services, preferred primes, cost, and flexibility. The bottom line is
that agencies should expect to see more “ZT” specific language in upcoming contract releases
and modifications, but there appears to be enough current and flexible contract options in the
federal marketplace to get agencies started on the road toward ZT.
Concluding Observations
Zero Trust is an evolutionary framework, not a revolutionary approach. It builds on existing
security concepts and does not introduce a radical new approach to cybersecurity. Like most
security concepts, Zero Trust relies on a fundamental understanding of an organization’s
services, data, users, and endpoints to be effective. There is no “free lunch” regarding up-front
resource investment. Policy definitions, concepts of deployment, trust determination (and
decay), enforcement mechanisms, logging aggregation, etc., all need to be considered prior to
deploying a solution. That said, many large-scale organizations (such as Google, Akamai, and
Purdue) that have made the investment show real return on security investment. The critical
question becomes whether ZT is mature enough to be a compelling choice for government
today.
ZT is not a technology in and of itself but a shift in the design approach for cybersecurity. The
current field of solutions show very mature and proven solutions when the network design uses
the integration of multiple vendor offerings into a comprehensive solution. However, there are
currently no vendors in the market offering a complete and comprehensive ZT/SDN solution.
Depending on what they seek, agencies may need to plan for a coordinated acquisition of
products and services from multiple vendors to meet their requirements. Although there don’t
appear to be specific and named “ ZT” contract vehicles available in the Federal space,
opportunities do exist to procure the enabling cyber product and service components of ZT via
existing vehicles.
No matter the solutions decided on for pursuing a Zero Trust Network, elements such as
Software Defined Networking and Identity, Credential, and Access Management (ICAM) are
essential components for a successful long term ZT strategy. ZT can augment and compliment
other cybersecurity tools and practices rather than replacing them. Threat intelligence,
23
continuous monitoring, and Red Teaming exercises remain important components to Zero Trust
Networking environments and a comprehensive security approach.
There is little doubt that an effective Zero Trust Networking deployment can significantly
improve an organization’s cybersecurity posture. However, many federal agencies have a
myriad of challenges including complex data and service interdependencies with other
organizations. These dependencies must be carefully considered prior to extending ZT to
mission-critical, multi-organizational workflows. ZT is a mature strategy that can provide a
positive cybersecurity return on investment but it may require up-front investments depending
on what agencies already have in place.
24
Credits
ACT-IAC would like to recognize the following organizations and people for their
contributions to this report:
Project Volunteers
ACT-IAC Project Leader
Dave McClure Accenture Federal Services
JD Henley Verizon
25
ACT-IAC Staff Support
Mike Howell
Mark Karkenny
Cyxtera
Duo
Fortinet
Zscaler
Gartner
26
Glossary
CDM - Continuous Diagnostics and Mitigation – federal program overseen by the Department of
Homeland Security to fortifying the cybersecurity of government networks and systems by
providing capabilities and tools and identifying and prioritizing cybersecurity risks on an ongoing
basis
Control Plane - components of Zero Trust Networks that receive and process requests from
data plane devices that wish to access (or grant access to) network resources.
Data Plane Definition – component of Zero Trust Networks that contains the applications,
firewalls, proxies, and routers that directly process all traffic on the network.
Deperimeterization – a strategy for protecting data on multiple levels by using encryption and
dynamic data-level authentication.15
ICAM – Identity, Credential, and Access Management - the tools, policies, and systems that
allow an organization to manage, monitor, and secure access to protected resources.
Network Agent - the combination of data known about the actors in a network request, typically
containing a user, application, and device, that is queried to make authorization decisions.
PIV - Personal Identity Verification – a process used to verify the identity of an individual in
order to grant them access to information systems and facilities.
PIV Card - Personal Identity Verification Card– a United States Federal smart card that contains
the necessary data for the cardholder to be granted access to Federal facilities and information
systems and assure appropriate levels of security for all applicable Federal applications.
PIV-D - NIST Special Publication 800-157 standard for the adoption of identity certificates for
mobile devices to replace physical PIV cards, which are hard to implement with mobile devices.
15 https://searchsecurity.techtarget.com/definition/deperimeterization
27
SDN - Software Defined Networking - an approach to cloud computing that facilitates network
management and enables programmatically efficient network configuration in order to improve
network performance and monitoring
Zero Trust - ZT - a security concept centered on the belief that organizations should not
automatically trust anything inside or outside their perimeters and instead must verify anything and
everything trying to connect to their systems before granting access16.
16 https://www.csoonline.com/article/3247848/what-is-zero-trust-a-model-for-more-effective-security.html
28
References
1. Report to the President on Federal IT Modernization,
https://itmodernization.cio.gov/assets/report/Report%20to%20the%20President%20on%
20IT%20Modernization%20-%20Final.pdf
3. BeyondCorp, https://cloud.google.com/beyondcorp/
4. Zero Trust Networks, Evan Gilman & Doug Barth, ISBN: 978-1-491-96219-0
5. Doherty, N. F., Ashurst, C., & Peppard, J. (2012). Factors affecting the successful
realization of benefits from systems development projects: Findings from three case
studies. Journal of Information Technology, 27(1), 1-16.
6. Karanja, E. (2017). The role of the chief information security officer in the management
of IT security. Information and Computer Security, 25(3), 300-329.
7. The Zero Trust eXtended (ZTX) Ecosystem, Extending Zero Trust Security Across Your
Digital Business,
https://www.forrester.com/report/The+Zero+Trust+eXtended+ZTX+Ecosystem/-/E-
RES137210
29