To deliver Zero Trust principles at all four layers, organizations need three things:

  1. Zero Trust-style access and authorization capabilities
  2. A foundation in basic cyber hygiene
  3. System integrity

Zero Trust access and authorization is well understood. Basic cyber hygiene—while sometimes challenging to implement—is simple to understand. But how does system integrity fit in?

What is Integrity?

Integrity is a core concept within cybersecurity—one pillar of the coveted CIA Triad.

CIA Triad (1)

  • Confidentiality: only those who are authorized can access data.
  • Integrity: data is in a trusted, accurate, and complete state and is only altered in expected ways.
  • Availability: data (and the systems and applications that rely on it) remain accessible.

Note that data doesn’t just mean documents and databases. Everything that allows an IT environment to function is stored in a file somewhere as data. This includes data stored in configuration files, system files, network devices, endpoints, directory services, cloud instances, etc. So long as data stays in the correct configuration and isn’t tampered with, everything will function as intended.

Ensuring integrity within an IT environment means ensuring that no matter what service, device, or user accesses, stores, processes, transmits, or receives data, it remains accurate and complete. Naturally, this requires a more comprehensive set of controls than have traditionally been deployed. Stefan Lesaru, IDSA Zero Trust Technical Working Group Lead, Big Data and Security Director, Atos, explains:

“One of the biggest shifts needed for Zero Trust is an increased focus on the data layer. In traditional cybersecurity, data is assumed to be safe if the external layers are secure. This simply isn’t true. Organizations need granular insight at the data level to maintain confidentiality and integrity.”

This requires four capabilities:

  1. An authoritative baseline of what data should look like.
  2. A means of identifying and protecting data from unauthorized change.
  3. A mechanism to roll back unauthorized changes not blocked at the source.
  4. A way to verify that controls 1-3 are functioning correctly.

The following closed-loop integrity assurance cycle demonstrates how this works in the real world:

This loop may appear time-consuming. However, so long as an organization has a trusted, authoritative baseline—a record of what is allowed to be and happen within the environment—the loop only needs to occur for unknown changes. Further, with the right technology, most of the loop can be automated.

The Missing Components of Zero Trust

Our new report, ‘The Missing Components of Zero Trust,’ explains what Zero Trust really is, examines some significant gaps in existing guidance, and details the most important concepts and capabilities required for an effective Zero Trust Architecture.

Download the report to learn:

  • The Core Principles and 7 Tenets of Zero Trust.
  • How the Zero Trust strategy and architecture eliminate implicit trust.
  • How to elevate your security posture and avoid making the most common Zero Trust mistakes.
  • The answer to the question, "Does Zero Trust actually work?"

Zero Trust Report

Tags:
Zero Trust
Lauren Yacono
Post by Lauren Yacono
August 9, 2022
Lauren is a Chicagoland-based marketing specialist at Cimcor. Holding a B.S. in Business Administration with a concentration in marketing from Indiana University, Lauren is passionate about safeguarding digital landscapes and crafting compelling strategies to elevate cybersecurity awareness.

About Cimcor

Cimcor’s File Integrity Monitoring solution, CimTrak, helps enterprise IT and security teams secure critical assets and simplify compliance. Easily identify, prohibit, and remediate unknown or unauthorized changes in real-time