Security

Zero Trust, Part 1: Making Sense of Security, Today's Most Complicated Jigsaw Puzzle

April 20, 2021

 

MAKING SENSE OF SECURITY, TODAY’S MOST COMPLICATED JIGSAW PUZZLE

Jigsaw puzzles come in many shapes, sizes, and complexities. But they all are completed in a similar way - viewing the end goal, determining a strategy, and implementing piece by piece. Similarly, IT environments come in varied architectures, sizes and complexities and may seem just as daunting as the most complex jigsaw puzzle at first glance. Does anyone in an organization really understand how all the pieces of security puzzle fit together? Not an understanding of general security models implemented, but how all the pieces of the entire enterprise jigsaw puzzle of security fit together? Is there a picture that shows you what it is supposed to look like when finished?

IT operation models, architecture models, platforms, hardware, software, employees, and outsourcers all come together to form the full picture for effective security. And, while we can probably never get to zero risk, we can implement Zero Trust to enable a layered series of controls giving us peace of mind amidst the complexities of the environment. The Zero Trust Model enables us to manage all the pieces of the puzzle with the least risk. It is imperative in today’s IT environments.

A MODEL DESIGNED TO CALM THE STORM

The Zero Trust security model can give us peace of mind even if we are not aware of every piece in our IT environment. At its most basic - never trust, always verify - it says that we should prepare our environments assuming we will be breached. By making this assumption, we will be proactive similar to the way we proactively and incrementally safeguard our homes and the content in our homes before going on vacation. Prior to departure for vacation, we lock up valuables, stop the newspaper and mail, automate lights, alert the neighbors, and lock the doors. All of these are mitigation efforts to discourage a burglar from targeting us and to reduce the exposure should they access our house even after the best of security intentions. Just as with our house, we can do the same with our IT environments. The model also drives the principle that trust is not automatic and trust is not assumed. Trust is gained at the entry point and reevaluated at each step on every journey. Resources are doled out in a granular fashion and only to those authorized. The trust level is commensurate with the task and not granted in excess. The Zero Trust model gives layers of protection and constantly verifies and validates. In total, it gives reassurance of security within the most complex of IT environments.

WHERE CAN ZERO TRUST HELP?

An all or nothing approach to implementing a new security model today is not an option. Security models and infrastructure are years in the making or, for the mainframe, decades in the making! Starting over by resetting every security control just isn’t an option our businesses can entertain.

But we don’t need to start from scratch to create a Zero Trust Model to lower our risk. More assuring, it is not necessary to conduct a massive evaluation and make changes to Identity and Access Management content. Instead, it is perfectly acceptable to augment existing IAM defenses with additional layers to provide a Zero Trust compliant model. As always, ‘rings of security’ and layered defenses are important in security architecture and the same works for implementation of Zero Trust. Advanced authentication at boundary or entry points and contextual granular just-in-time authorization drives layered security checks in a series. Zero Trust is simply implemented with a combination of additional tools and by following best practices with existing tools. From Multi-Factor Authentication, often easily or already adapted to existing architectures, to practices such as more granular controls, separation of duties and stringent adherence to least access privilege standards can all lead to a model of access driven by the goals of Zero Trust.

Analysis of few well-known data breaches can illustrate where implementation of the Zero Trust model may have reduced the success and impact of the breach, perhaps resulting in the hackers abandoning their efforts:

  1. In March 2020, Marriott disclosed that credentials from two employees were used to access a large amount of guest information. A Zero Trust model could have reduced risk by:
    • Requiring Multi Factor to deepen the trust in the identity of the individual. Credential compromise is much more difficult when additional factors are required.
    • Using views or stored procedures to restrict access to data and allow data access commensurate with the need to know and validating business justification for access.
    • Continuous monitoring to alert on the egress of classified data, abnormal behavior from otherwise steadfast employees accounts.
  2. The credit union, Desjardins Group, suffered an attack from a malicious insider. Under the Zero Trust model where a breach is assumed from internal or external sources, additional preventive or deterrent controls could have been implemented:
    • Granular business justified access. Over 17 people were questioned with involvement in this incident. That large number of potential attackers suggests that Need-to-Know, granular access, and business justified access may not have been followed as rigidly as possible in this case.
    • Physical and/or data segregation was not followed. This would have allowed for granular access controls and required a business need to gain access to data stores containing personal information.

The illustrations above describe incremental changes that, when added to a layered series of security controls would have reduced the risk and painted a richer enterprise security picture. Incremental changes are manageable and often simpler. It’s just a matter of committing to and implementing the next step in completing the puzzle.

USING INCREMENTAL STEPS TO GROW YOUR ACHIEVEMENT OF ZERO TRUST

Many Zero Trust efforts focus on specific challenges, such as controlling access to cloud resources. But security objectives are rarely achieved by a single-point fix or even a tool deployment. Zero Trust isn’t a part number, but an approach and way of thinking. While ignoring some platforms or focusing only on specific business units might lead to quickly achieving a ‘check box’ result for the Security and IT team, it often does little to deliver on actual improvement in security posture. This consistently applies to Mainframe where there is a common belief that it is secure, simply because it is a Mainframe. However, just as with any platform, the Mainframe too is only as secure as the people and policies make it. Much new thinking in security has led to changes in policies, procedures, and practices across many platforms, but often, Mainframe does not participate in these new practices, despite the critical nature of the platform in running most businesses.

We’ll continue with a series of posts, videos, how-to content and more on our Zero Trust web page (link) discussing Zero Trust on the mainframe. The goal is to provide pragmatic practices that can be adopted by any Mainframe team, allowing them to leverage the benefits of Zero Trust sweeping the security community.

Admittedly, enterprise IT environments are large and complex. This applies to the mainframe as well, but don’t be overwhelmed. We will discuss how to implement a Zero Trust model with the mainframe in mind. Note this won’t be and can’t be exclusive to the mainframe, as it is part of a larger hybrid environment delivering applications that span cloud, on-prem and mainframe assets to deliver value to customers. But it is time that mainframe adopted critical security models such as Zero Trust. In order to do so, we will approach the topic in several segments:

  • What makes the Zero Trust model difficult to implement in the mainframe environment?
  • How to adopt Zero Trust on the Mainframe?
  • Developing deeper trust in the identity of those accessing the mainframe
  • Authentication verification
  • Who and What are privileged accounts on the mainframe?
  • Where does continuous monitoring factor into Zero Trust
  • Zero Trust and Hybrid IT

In Summary, the bad news is that we need to assume and prepare for the worst-case scenario. The good news is that efforts are layered and can be implemented incrementally. Risk reduction is gained at each step. Improve your peace of mind. Achieve Zero Trust with Broadcom Mainframe Security Suite.  And join us for ongoing discussions on the benefits of implementing Zero Trust on the mainframe.


SOURCES:

1CBC News · Posted: Dec 14, 2020 10:16 AM ET | Last Updated: December 14, 2020 | Gaps in safeguards led to massive Desjardins security breach: privacy commissioners

2 CBC News · Posted: Nov 01, 2019 10:44 AM ET | Last Updated: November 1, 2019 | 4.2 million Desjardins members affected by data breach, credit union now says Gaps in safeguards led to massive Desjardins security breach: privacy commissioners

3 Marriott International News Center· MARCH 31, 2020 — BETHESDA, MD | Last Updated: November 1, 2019 | Marriott International Notifies Guests of Property System Incident


 

 

Tag(s): Security, Mainframe

Subscribe to blog updates

By submitting this form I acknowledge that my use of Broadcom’s website is subject to Broadcom’s Terms of Use, and that my personal data is processed according to Broadcom’s Privacy Policy.