Abstract
With a significant move to home working during the pandemic zero trust concepts have gained greater acceptance, and there was significant hype about the Zero Trust attributes of many security products. Indeed, every security company now claims to embrace Zero Trust. Many do so without stating which of their products or services contribute to a Zero Trust framework. This hype has raised awareness of the security issues associated with remote working, which obviously is a very positive acknowledgement that current security frameworks need to be improved to embrace the fast-growing use of technologies such as video conferencing, screen sharing and even Cloud identity management systems.
Behind the scenes there has been significant developments:
In February 2020 Weever and Andreou [3] published Zero Trust Network Security Model in containerized environments and examined containerised communications and Zero Trust implementations in depth, and how in software defined networks micro segmentation protects is managed by a network policy engine that can use a security sidecar module to shut down a network segment in the event of an attack being identified.
In February and March 2020 two draft articles were published Implementing a Zero Trust Architecture and a NIST draft of a Zero Trust framework with a Policy Engine making policy decisions based on monitoring and threat intelligence. These draft documents show how NIST is distilling the theory into a standard architecture for Zero Trust implementations. This is a milestone in the Zero Trust story as this will lead to a common approach that will allow corporations to be able to align their strategies with a recognised Zero Trust framework.
In April Malhotra [9] made the argument how the USA should take the Lead in Data Protection by using Zero Trust Architectures and Penetration Testing. This is an interesting argument as with a blurred network perimeter, the penetration tester no longer has a single point of entry to the network to test an organisation and a Penetration Testers job nowadays is more to do with testing an organisations resilience to phishing emails and social engineering than trying to exploit communication port vulnerabilities that might exist on external IP addresses at perimeter firewalls.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Blokdyk G (2020) Zero trust network a complete guide – 2020 Edition published by 5starcooks
Conway A (2020) New data from microsoft shows how the pandemic is accelerating the digital transformation of cyber-security. https://www.microsoft.com/security/blog/2020/08/19/microsoft-shows-pandemic-accelerating-transformation-cyber-security/. Accessed 20 Aug 2020
de Weever C, Andreou M (2020) Zero trust network security model in containerized environments. https://delaat.net/rp/2019-2020/p01/report.pdf. Accessed 12 May 2020
Edwards C (2020) Border control: cyber security when your staff are at home. hyttps://eandt.theiet.org/content/articles/2020/05/border-control/. Accessed 20 may 2020
Gillibrand K (2020) Beyond data protection to command and control (C2) sustainability in a post-COVID19 world. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3581454). Accessed 24 May 2020
Gilman E, Barth D (2017) Zero trust networks. O’Reilly C.A. USA
Hammett J (2014) Bro script to detect plain test passwords. https://bro.bro-ids.narkive.com/J4Tq9PBC/bro-script-to-detect-plain-text-passwords. Accessed 10 Aug 2020
Kerman A, Borchert O, Rose S (2020) Implementing a zero trust architecture. https://csrc.nist.gov/publications/detail/white-paper/2020/03/17/implementing-a-zero-trust-architecture/draft. Accessed 24 May 2020
Malhotra Y (2020) Beyond data protection to command and control (C2) sustainability in a post-COVID19 world. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3581454. Accessed 12 May 2020
Mehraj S, Banday T (2020) Establishing a zero trust strategy in cloud computing environment. https://ieeexplore.ieee.org/document/9104214/figures#figures. Accessed 23 June 2020
NCSC Peter R (2020) Zero trust principles – beta release. https://www.ncsc.gov.uk/blog-post/zero-trust-principles-beta-release. Accessed 1 Jan 2021
NIST-2 (2020) Why traditional network perimeter security no longer protects. https://www.nccoe.nist.gov/news/why-traditional-network-perimeter-security-no-longer-protects. Accessed 8 Aug 2020
Rose S, Borchert O, Mitchel S, Connelly S (2020) NIST special publication 800–207 zero trust architecture. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf. Accessed 23 Aug 2020
Slater J (2020) Microsoft’s failures to renew: teams, hotmail, and hotmail.co.uk. https://arstechnica.com/gadgets/2020/02/yesterdays-multi-hour-teams-outage-was-due-to-an-expired-ssl-certificate/. Accessed 4 April 2020
Slattery (2018) Examining emerging network protocols. https://www.nojitter.com/examining-emerging-network-protocols. Accessed 12 July 2020
Strickland J (2020) The weak link in video conferencing tools – passwords. https://ceo-insight.com/cyber-security/the-weak-link-in-video-conferencing-tools-passwords/. Accessed 12 July 2020
Zaheer Z, Chang H, Mukherjee S, Van der Merwe J (2020) eZTrust:network-independent zero-trust perimeterization for microservices. https://doi.org/10.1145/3314148.3314349. Accessed 26 June 2020
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Haddon, D., Bennett, P. (2021). The Emergence of Post Covid-19 Zero Trust Security Architectures. In: Jahankhani, H., Kendzierskyj, S., Akhgar, B. (eds) Information Security Technologies for Controlling Pandemics. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-030-72120-6_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-72120-6_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-72119-0
Online ISBN: 978-3-030-72120-6
eBook Packages: Computer ScienceComputer Science (R0)