Service

  • Cloud Transformation
  • Data and AI

Article

by Jeff Ramsdale

Migrating to Zero Trust

This is the third blog post in a series on the Zero Trust network model. In the previous two entries, we discussed The Case for Zero Trust and Implementing Zero Trust, while this one will cover migrating to Zero Trust from a more typical network architecture.

Zero Trust, recall, is the networking paradigm wherein the traditional “hardened” corporate firewall and typical lax security within it is replaced with a model that does away with the peripheral firewall; and in which all clients and services must mutually authenticate and communicate via encrypted means. It also removes the need for Virtual Private Networks (VPNs), since a VPN is essentially a tunnel into a theoretically secure network, and Zero Trust rejects the notion that secure networks can even exist. With no corporate firewall and no VPN, there is never a presumption of “friendliness” between clients and systems that could lead to a security breach by a nefarious actor acquiring an elevated trust status, for instance, by getting access to a server within the corporate network.

Famously, Google implemented Zero Trust and documented it in a series of whitepapers under the banner of BeyondCorp. As they said in their third whitepaper: “One goal of BeyondCorp is to replace trust in the network with an appropriate level of trust in the device.” Establishing that trust requires new infrastructure and services, which requires investment and a high level of technical competence. Additionally, all technology projects of this magnitude must begin as organizational initiatives and depend on unwavering executive support. Having such backing allows planning to commence, beginning with an inventory of existing systems and user profiles, then establishing an orderly move from the old paradigm to the new while ensuring users continue to maintain uninterrupted access.

Taking Inventory

A move to Zero Trust either will fail or will prove to be painful if a thorough inventory of existing services isn’t captured during planning. As well a full understanding of system-to-system dependencies and profiles of categories of users is also necessary. The former serves to prioritize the order in which systems should move out of the corporate network, while the latter informs the order in which users can be weaned off their VPN use. A directed graph of service dependencies may identify “leaf” services that are clients of other services while not having clients of their own, suggesting an early move. Alternatively, a cluster of services may function as a highly coupled unit but with relatively few outgoing service connections and no incoming ones. Such a cluster may be a good candidate for a prioritized collective move to Zero Trust, while services with numerous dependencies may be better served by a later move.

While service dependencies tend to be static, users are altogether less predictable. Particularly in large organizations, however, users have a tendency to fall into profiles of activity, often by job function. That is, developers likely require access to code repositories, wikis, CI/CD pipelines, and deployment platforms, for example, while HR personnel may use an entirely different set of applications. Categorizing users according to the applications they use allows applications to be prioritized for movement to Zero Trust. Each cluster of users whose primary applications move to Zero Trust results in a corresponding reduction in dependence on a VPN for corporate network access.

Instrumenting both user workstations and applications is vital not only to building the initial inventory and determining an order of migration but also for monitoring usage patterns once the migration begins. This telemetry data can help ensure mistakes aren’t made in prematurely moving services out of the corporate network or revoking user access. For instance, if the metrics, such as traffic logs, show that clients–either users or other services–are making requests from within the corporate network against a given in-network service, that service cannot yet move to the Zero Trust network. This is in keeping with the policy that connections from the new Zero Trust network to the old corporate network should be discouraged.

Migration

Having captured a service inventory and user profiles and established an order of precedence, the migration work can begin, typically organized into phases. It is suggested that, rather than attempting to make in-place changes to services and networks, a new Zero Trust virtual network be created with services and then migrated to it. Services that remain in the “privileged” corporate network may make calls out to the Zero Trust network, but if possible, calls initiated outside the corporate network should be prohibited within it.

Efforts to reduce the size of the corporate network perimeter are particularly beneficial. For instance, if the corporate network extends from a cloud provider to one or more onsite locations, reducing the perimeter to strictly the cloud may be a positive step, even if it requires users to VPN in. The physical network access within a building, both wired and wifi, provides vectors for a bad actor to penetrate the defenses. Note that many services may continue to reside onsite, such as printers, physical security systems such as cameras and, badge readers–even vending machines. The inventory taken above should have accounted for all such systems and ensured that they would continue to function once migrated out of the corporate network.

If Zero Trust were easy to implement, most companies would likely already have done so. As such, once the necessary infrastructure is ready, applications themselves may still require rework in order to be compatible with the authentication, telemetry gathering, and other mechanisms necessitated by Zero Trust. Both for reasons of conforming with these requirements and to benefit from modern development and deployment practices, it may be an opportune moment to containerize applications, introduce a service mesh, deprecate out-of-date technologies, and/or perform other architectural upgrades. These should be in pursuit of simplification and take advantage of the undifferentiated heavy-lifting capability of the cloud and externalizing cross-cutting concerns from applications. As well, some technologies, such as NFS, may be difficult or impossible to support in a Zero Trust model and will need to be replaced. Some applications, however, may be relatively easy to migrate. For instance, web applications may require little more than placement behind the access proxy introduced in the last post.

The User Experience

If the enhanced protection afforded by Zero Trust came at the cost of user experience, one could imagine pushback from frustrated users. Fortunately, however, by dispensing with a VPN, Zero Trust arguably provides a better user experience. Though ubiquitous 2-factor authentication is enforced, the use of a USB hardware security token can make the login process seamless. Buy-in from users can be a useful benefit as more and more applications migrate to Zero Trust, and fewer require users to connect to a VPN prior to their use. The eventual retirement of the VPN would therefore be an occasion to celebrate rather than dread.

That said, as it could be disastrous to remove a user’s access to a given application they continue to require to perform their job function, it is vital to capture metrics on user activity to ensure VPN access is not revoked prematurely. Properly instrumented workstations and applications can ensure that each user’s application usage is tracked. If a given user accesses no applications in the corporate network for, say, a month, they could be sent an email warning that their VPN access will be revoked unless they receive a dispensation from a manager. Such exceptions should be discouraged, but only if the successful migration of necessary applications has truly enabled them to function sans VPN. These exceptions should also expire, requiring renewal and thereby serving as bureaucratic motivation to minimize their use. With respect to new users, aiming for Zero Trust by default–that is, only providing VPN access to those who truly need it–should be considered a goal. Achieving this can serve as notable evidence of a Zero Trust migration’s ongoing success.

In the fourth and fifth of their five whitepapers on the subject of their Zero Trust migration, Google emphasized the need for users to be able to address their own technical issues through useful error messages that enable users to self-mitigate and with thorough, searchable documentation and FAQs. Any question a user can answer on their own helps prevent overtaxing the limited resource that is support staff time. Capturing traffic logs and telemetry data in such a way as to be easily accessible for support purposes can also help in keeping productivity high. Since the migration effort is liable to have high user visibility, frequent communication is likely to be necessary. Automating as much of this communication as possible is vital to reducing the human cost of the effort. With careful planning and implementation, friction for users can be reduced to a minimum, and staff can spend more time on value-adding migration efforts rather than costly support.

Conclusion

Migrating to Zero Trust is the culmination of a process that may take years to complete, involving planning, measuring, and implementing while requiring a wide variety of skill sets, both technical and managerial. There is the risk of user confusion, even pushback by those resistant to change. Missteps may require rollbacks and rethinking of the planned approach. Metrics, when analyzed, may necessitate reordering long-planned migration sequences. Despite these challenges, the prospect of a more secure network and enhanced usability can help motivate the substantial commitment Zero Trust requires.

Good candidates for moving to Zero Trust are those organizations that are able to implement an entirely new network architecture, build the authentication, proxy, and rules infrastructure to govern access and roll out a carefully scripted migration over the course of years while continuing to service their existing customers without significant impact. However, for those unable or unwilling to commit to a full migration, the principles of Zero Trust are still valuable in guiding security considerations for their own software development and deployment, whether for internal or external customers. Even modest changes may reduce the surface area for malicious attacks.

The naive belief that a corporate network can be entirely secure has been thoroughly debunked. Trust should be earned by each client, not granted by default, and security should be ensured through mutual authentication and encryption.

Related content

Event

  • Data and AI
  • Seamless Experiences
  • Strategy and Transformation

Event: Big Data & AI World in Frankfurt

Germany's leading event for Big Data & AI technologies opens its doors. Nortal is a Silver Sponsor of this year's Big Data & AI World in Frankfurt.

Article

Get started with GenAI
  • Data and AI
  • Strategy and Transformation

How to get started with GenAI: Get ahead or get left behind

The emergence of GenAI offers an unprecedented opportunity for organizations to gain a competitive advantage. After a year of exploration and testing, it’s time to take action with a clear roadmap that can help mitigate some of the risks.

Article

  • Data and AI
  • Strategy and Transformation
  • Technology and Engineering
  • Enterprise
  • Industry
  • Manufacturing

A game-changer - turning industrial ESG reporting from a hurdle into an opportunity 

The industrial sector stands at a unique crossroads, with the opportunity to leverage the ESG revolution to transform regulatory compliance into a strategic asset. By embracing tools like Microsoft Sustainability Manager and partnering with seasoned industry experts like Nortal, organizations can effectively navigate the complexities of ESG reporting and emerge as leaders in sustainability.

Get in touch

Let us offer you a new perspective.