A security model that assumes no entity, whether inside or outside the network, can be trusted by default.
Description
Zero Trust is a comprehensive security framework that operates on the principle of 'never trust, always verify.' This approach is particularly relevant in the context of Non-Human Identities (NHIs), such as automated systems, IoT devices, and applications, which are increasingly prevalent in modern IT environments. In a Zero Trust architecture, every access request is rigorously authenticated and authorized, regardless of the source of the request. This means that NHIs are treated with the same scrutiny as human users, ensuring that they only have access to the resources necessary for their function and that their behavior is continuously monitored. By employing techniques such as identity and access management, micro-segmentation, and continuous monitoring, organizations can mitigate risks associated with NHIs, which are often targeted by cyberattacks. The Zero Trust model helps in reducing the attack surface, enhancing visibility, and ensuring compliance with security policies, ultimately leading to a more resilient and secure IT infrastructure.
Examples
- Automated software tools that require authentication before accessing sensitive data.
- IoT devices that must verify their identity and permissions for network access.
Additional Information
- Zero Trust emphasizes the need for granular access controls and continuous verification.
- The model is increasingly adopted in cloud environments where NHIs play a significant role.
References
- Human vs. Non-Human Identity in SaaS
- The proliferation of non-human identities - Help Net Security
- Non-human Account Management (v4)
- The case for using non-human personas in design
- Incorporating Machine Identities into an Identity-Centric Strategy | Identity Defined Security Alliance
- Why non-human workers can increase security issues in your business
- How “personhood credentials” could help prove you’re a human online
- NIST Special Publication (SP) 800-207, Zero Trust Architecture
- Zero Trust Security | The Perfect Storm
- Proof of Humanity and Cost of Forgery