Zero Trust
Retake control of your data with Pomerium's self-hosted reverse proxy.
Let’s start off with an executive-level summary for the time-conscious.
Why should I care about zero trust?
What is zero trust?
What makes a solution zero trust?
If you don’t want corpo-speak, we have a convenient C-level Guide to Zero Trust.
Zero trust saves organizations 20.5% in data breach costs, averaging just over $1 million USD
Compromised credentials give access to larger parts of the network
Malicious insiders or negligent contractors can abuse their privileges
Third party breaches can spillover to impact operations without much recourse
The traditional network-centric model is failing as the Perimeter Problem continues to play out. Many companies are currently either on the Traditional or Initial tier of the Cybersecurity and Infrastructure Security Agency (CISA)’s Zero Trust Maturity Model, making them vulnerable to basic attack vectors such as the ongoing Snowflake breach affecting over 165 companies at time of writing.
You want to identify and stop bad actions before they are allowed to happen. Anything less is insecure.
Zero trust does not mean “don’t trust anything.” In broad strokes:
Trust does not flow based on where the requesting user is located
Every action is continuously verified against identity, posture, and context
Zero trust is a security model that assumes no one — whether inside or outside the network — can be trusted by default. This approach has become necessary because of compromised credentials, malicious insiders, and negligent contractors.
Here’s how the National Institute of Standards and Technology (NIST) puts it in Special Publication (SP) 800-207:
"Zero Trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. Zero Trust Architecture (ZTA) is an enterprise’s cybersecurity plan that uses zero trust concepts and encompasses component relationships, workflow planning, and access policies. Therefore, a zero trust enterprise is the network infrastructure (physical and virtual) and operational policies that are in place for an enterprise as a product of a ZTA plan."
Instead of assuming that users or devices are inherently trustworthy once they are inside the network perimeter, zero trust explicitly verifies every request as though it originates from an open network such as the world wide internet. Trust is incrementally established as individual factors are verified, then access is granted for a single access request. This verification process is repeated on the next action because circumstances may have changed, making zero trust a continuous cycle of verification before allowing an action to execute.
Adopting this principle and mindset completely changes the approach an organization would use for their internal access.
Most solutions claim to be zero trust, but fail to be zero trust upon examination of the inner workings of their solutions. Organizations often ask their own practitioners to determine whether a solution fits the key principles of a zero trust cybersecurity solution, which can be summarized as:
Constant, explicit verification — Always authenticate and authorize based on all available data points, including user identity and contextual data such as location, device posture and state, service or workload, data classification, and any other anomalies.
Assume Breach — Companies should proceed as though a breach has already happened. This is done by implementing efforts to minimize blast radius and prevent lateral movement, with the fundamental assumption being that an account logging in may be compromised.
Zero trust architecture answers the following questions:
Who is trying to acccess, and how do we know? — ****How does the target resource confirm the user’s identity using multiple factors? Is it just a user entering the right credentials, or are other factors verified?
Should we allow them access? — How does the resource confirm a verified user has the necessary privileges? Are there security policies in place to grant fine-grained access to strictly authorized users?
Are there other contextual factors we should consider? — Identity is immutable, but contextual factors often change on a case-by-case basis. For example, if a user is normally authorized but currently on probation, is it still safe to grant them access? If an account normally logs in from USA but is logging in from another country, is it safe to grant the same degree of access?
Has anything changed between then and now? — Every action should be treated as brand new, continuously verifying the above is true. Even the same user in the same session can be compromised if the session was hijacked or the session token stolen.
(Source: CISA’s Zero Trust Maturity Model)
NSA's Advancing Zero Trust Maturity Throughout the User Pillar
NSA's Advancing Zero Trust Maturity Throughout the Device Pillar
NSA's Advancing Zero Trust Maturity Throughout the Network and Environment Pillar
CISA’s Zero Trust Maturity Model
USA government’s Official Zero Trust Website
Department of Defense Zero Trust Reference Architecture
Department of Defense Zero Trust Strategy and Roadmap
NSTAC Report to the President on Zero Trust and Trusted Identity Management
UK National Cyber Security Centre: Zero Trust Architecture Design Principles
Github for UK National Cyber Security Centre: Zero Trust Architecture
Build Security Into Your Network's DNA: The Zero Trust Network Architecture by John Kindervag, Creator of Zero Trust
[Book] Zero Trust Networks by Evan Gilman, Doug Barth
[Book] Zero Trust Security by Jason Garbis, Jerry W. Chapman
A verified user doesn't result in inherently safe actions. Pomerium continuously verifies each action against identity, posture, and context based on security policies before an action is allowed to happen. This directly limits lateral movement and protects against compromised credentials and malicious insiders.
This is a direct upgrade from session-based solutions where the security stops once a user has been verified and connection starts.
Context-aware access is where the context surrounding access is taken into consideration even if the correct user credentials are presented.
Pomerium integrates with and leverages any source of institutionally relevant to make access control decisions. Moreover, the reverse proxy is self-hosted so the sensitive contextual data never leaves the organization's infrastructure, as context-aware access should never be used with a third-party hosted solution.
Companies are realizing there is no point in replacing their old VPN client and tunneling solutions with SASE or ZTNA offerings that are just bundling up the same tunneling architecture.
The Perimeter Problem exists because many solutions stopped checking once the correct user credentials were presented to establish a secure session into the network perimeter. As a result, any solution requiring logging into a client tunneling into your infrastructure is inherently insecure.
Pomerium presents a different architecture as a layer 7 reverse proxy to solve the problems introduced by tunneling solutions.
Unlike VPNs and managed solutions, Pomerium can be deployed and scaled however your organization requires it. Conversely, other alternatives require your organization to deploy and scale according to their infrastructure because you are plugging into their network backbone. No third-party organization's architecture should be dictating your organization's growth and scaling needs.
Zero trust applies to big brand names as they can ruin you through mis-configurations or have a culture that doesn't prioritize cybersecurity. We'll let the cybersecurity experts at ExtraHop say it:
Developers can add Pomerium's access control and deploy to production with full confidence that the company's security policies are being enforced.
Company
Quicklinks
Stay Connected
Stay up to date with Pomerium news and announcements.