April 18, 2023 By David Heath 5 min read

What is zero trust, and what frameworks and standards can help implement zero trust security principles into your cybersecurity strategies?

Many IBM clients want to know what exactly zero trust security is and if it’s applicable to them. Understanding the zero trust concept and how it has evolved will help you and many of our clients understand how to best implement it to protect your company’s most valuable assets.

What is zero trust?

Zero trust is a framework that assumes every connection and endpoint are threats, both externally and internally within a company’s network security. It enables companies to build a thorough IT strategy to address the security needs of a hybrid cloud environment. Zero trust implements adaptive and continuous protection, and it provides the ability to proactively manage threats.

In other words, this approach never trusts users, devices or connections for any transactions and will verify all of these for every single transaction. This allows companies to gain security and visibility across their entire business and enforce consistent security policies, resulting in faster detection and response to threats.

The introduction of zero trust

Zero trust began in the “BeyondCorp” initiative developed by Google in 2010. The initiative’s goal was to secure access to resources based on identity and context, moving away from the traditional perimeter-based security model. This strategy allowed Google to provide employees with secure access to corporate applications and data from anywhere, using any device, without the need for a VPN.

In 2014, Forrester Research analyst John Kindervag coined the concept zero trust to describe this new security paradigm in a report titled “The Zero Trust Model of Information Security.” He proposed a new security model that assumes no one—whether inside or outside the organization’s network—can be trusted without verification. The report outlined the zero trust model  based on two primary principles: “Never trust, always verify.”

All users, devices and applications are assumed to be untrusted and must be verified before they are granted access to resources. The principle of least privilege means that every user or device is granted the minimum level of access required to perform their job, and access is only granted on a need-to-know basis.

Since then, the concept of zero trust has continued to gain momentum, with many organizations adopting its architectures to better protect their digital assets from cyber threats. It encompasses various security principles and technologies that are deployed to strengthen security and reduce the risk of security breaches.

Types of zero trust security models

  • Identity-based zero trust: This model is based on the principle of strict identity verification, where every user or device is authenticated and authorized before accessing any resources. It relies on multi-factor authentication, access controls and least-privilege principles.
  • Network-based zero trust: This focuses on securing the network perimeter by segmenting the network into smaller segments. It aims to reduce the attack surface by limiting access to specific resources to authorized users only. This model uses technologies like firewalls, VPNs and intrusion detection and prevention systems.
  • Data-based zero trust: This model aims to protect sensitive data by encrypting it and limiting access to authorized users. It employs data classification and labeling, data loss prevention and encryption technologies to protect data at rest, in transit and in use.
  • Application-based zero trust: This focuses on securing applications and their associated data. It assumes that all applications are untrusted and must be verified before accessing sensitive data. It uses application-level controls—such as runtime protection and containerization—to protect against attacks like code injection and malware.
  • Device-based zero trust: This model secures the devices themselves (e.g., smartphones, laptops and IoT devices). It assumes that devices can be compromised and must be verified before accessing sensitive data. It employs device-level security controls, such as endpoint protection, device encryption and remote wipe capabilities.

These models are designed to work together to create a comprehensive zero trust architecture that can help organizations to reduce their attack surface, improve their security posture and minimize the risk of security breaches. However, it’s important to note that the specific types of zero trust security models and their implementation may vary depending on the organization’s size, industry and specific security needs.

Zero trust has become a popular approach to modern cybersecurity. It has been embraced by many organizations to address the growing threat of cyberattacks and data breaches in today’s complex and interconnected world. As a result, many technology vendors have developed products and services that are specifically designed to support zero trust architectures.

What is the National Institute of Standards and Technology (NIST)?

There are also many frameworks and standards that organizations can use to implement zero trust security principles in their cybersecurity strategies with the guidance of the National Institute of Standards and Technology (NIST).

NIST is a non-regulatory government agency at the U.S Department of Commerce, aimed at helping companies to better understand, manage and reduce cybersecurity risks to protect networks and data. They have published a couple of highly recommended comprehensive guides on zero trust:

NIST SP 800-207, Zero Trust Architecture

NIST SP 800-207, Zero Trust Architecture was the first publication to establish the groundwork for zero trust architecture. It provides the definition of zero trust as a set of guiding principles (instead of specific technologies and implementations) and includes examples of zero trust architectures.

NIST SP 800-207 emphasizes the importance of continuous monitoring and adaptive, risk-based decision-making. They recommend implementing a zero trust architecture with the Seven Pillars of Zero Trust (traditionally known as the Seven Tenets of Zero Trust)

Seven Pillars of Zero Trust

  1. All data sources and computing services are considered resources.
  2. All communication is secured regardless of network location.
  3. Access to individual enterprise resources is granted on a per-session basis.
  4. Access to resources is determined by dynamic policy—including the observable state of client identity, application/service and the requesting asset—and may include other behavioral and environmental attributes.
  5. The enterprise monitors and measures the integrity and security posture of all owned and associated assets.
  6. All resource authentication and authorization are dynamic and strictly enforced before access is allowed.
  7. The enterprise collects as much information as possible about the current state of assets, network infrastructure and communications and uses it to improve its security posture.

Overall, NIST SP 800-207 promotes an overall approach to zero trust that is based on the principles of least privilege, micro-segmentation and continuous monitoring, encouraging organizations to implement a layered security approach that incorporates multiple technologies and controls to protect against threats.

NIST SP 1800-35B, Implementing a Zero Trust Architecture

NIST SP 1800-35B, Implementing a Zero Trust Architecture is the other highly recommended publication from NIST and is comprised of two main topics:

  1. IT security challenges for private and public sectors.
  2. “How-to” guidance to implement a zero trust architecture in enterprise environments and workflows with standard-based approaches, using commercially available technology.

The publication correlates IT security challenges (applicable to private and public sectors) to the principles and components of a zero trust architecture so that organizations can first properly self-diagnose their needs. They can then adopt the principles and components of a zero trust architecture to meet the needs of their organization. Therefore, NIST SP 1800-35B does not identify specific types of zero trust models.

Maintaining continuity between architecture(s) and framework(s) as zero trust evolves

NIST leverages iterative development for the four zero trust architectures they have implemented, allowing them ease and flexibility to make incremental improvements and have continuity with the zero trust framework as it evolves over time.

The four zero trust architectures implemented by NIST are as follows:

  1. Device agent/gateway-based deployment.
  2. Enclave-based deployment.
  3. Resource portal-based deployment.
  4. Device application sandboxing.

NIST has strategic partnerships with many technology organizations (like IBM) that collaborate to stay ahead of these changes and emerging threats.

The collaboration allows IBM prioritize development to ensure technology solutions align with the seven tenets and principles of zero trust, securing and protecting IBM clients’ systems and data.

Learn more

Learn more about the importance of zero trust in IBM’s 2022 Cost of a Data Breach Report or directly connect with one of IBM’s zero trust experts.

Additional resources

Was this article helpful?

More from Security

Enhance your data security posture with a no-code approach to application-level encryption

4 min read - Data is the lifeblood of every organization. As your organization’s data footprint expands across the clouds and between your own business lines to drive value, it is essential to secure data at all stages of the cloud adoption and throughout the data lifecycle. While there are different mechanisms available to encrypt data throughout its lifecycle (in transit, at rest and in use), application-level encryption (ALE) provides an additional layer of protection by encrypting data at its source. ALE can enhance…

Enhancing data security and compliance in the XaaS Era 

2 min read - Recent research from IDC found that 85% of CEOs who were surveyed cited digital capabilities as strategic differentiators that are crucial to accelerating revenue growth. However, IT decision makers remain concerned about the risks associated with their digital infrastructure and the impact they might have on business outcomes, with data breaches and security concerns being the biggest threats.   With the rapid growth of XaaS consumption models and the integration of AI and data at the forefront of every business plan,…

IBM named a Leader in Gartner Magic Quadrant for SIEM, for the 14th consecutive time

3 min read - Security operations is getting more complex and inefficient with too many tools, too much data and simply too much to do. According to a study done by IBM, SOC team members are only able to handle half of the alerts that they should be reviewing in a typical workday. This potentially leads to missing the important alerts that are critical to an organization's security. Thus, choosing the right SIEM solution can be transformative for security teams, helping them manage alerts…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters