By Computerworld UK, Contributing Editor
Within the space of a decade, the term zero trust (ZT) has gone from a term coined by Forrester analyst, John Kindervag, to a cybersecurity movement promoted by some as a way out of the unfolding economic disaster of unchecked cybercrime.
Zero trust is based on two simple observations. The first is that traditional perimeter security based on keeping attackers outside the firewall is doomed to failure because there are simply too many weaknesses and points of entry for this to be effective.
The second is that the fundamental cause of many cyberattacks is the dysfunctional way that trust operates in legacy cybersecurity. In this model, good security is about dividing users, devices, and connections into those which are trustworthy and those which are not. Some have access rights and privileges, and others don’t.
Zero trust security, by contrast, replaces this with the idea that nothing should automatically be trusted unless it has been carefully verified. Every user, device, and connection are a potential risk and should start from a position of zero trust.
Given that zero trust is a security model rather than a technology recommendation, how should organisations implement it?
In the approach adopted for HP Wolf Security, zero trust starts with the core of the security problem, namely the endpoint device. Typically, these are PCs, servers, and printers, but increasingly mobile devices, and a multitude of industrial operational technology (OT) and Internet of Things (IoT) equipment such as security cameras, in-car systems, and smart speakers.
In legacy security, devices are protected with security programs, while users are secured using rules and policies. There are difficulties, however, in maintaining a multiplicity of layers based on different security policies – especially as some of them are not interoperable.
We see the failures of this model in the way cybercriminals routinely target devices and user accounts as easy points of weakness through which to bypass perimeter security. As the HP Wolf Security Threat Insights Report for the first half of 2021 found, even privileged senior executives can be at risk, with campaigns regularly targeting them by name using boobytrapped attachments.
Similarly, the HP Wolf report Blurred lines and Blindspots explored the way that changes in working patterns brought about by remote working have stretched the perimeter model to breaking point. With the perimeter now often located on devices connected to insecure home networks, security assumptions based on traditional firewall defence have been rendered obsolete.
According to Ian Pratt, HP’s global head of security for personal systems “70% of breaches start with an endpoint compromise: A user clicks on something that lets a hacker take control of their machine and then use it as a beachhead. The attacker’s goal is to get on to the machine of a privileged user, and then follow them when they access high-value services, resulting in whole organization compromise and a very serious breach.”
HP Wolf Security zero trust addresses this by breaking down endpoint security into a series of layers. This starts with hardware-enforced security to protect the vulnerable chips and firmware which in traditional security are left unprotected. This layer includes features such as a self-healing BIOS protection and a central controller chip which helps recover compromised devices while monitoring for new vulnerabilities.
A second software layer of protection called HP Sure Click [i] provides the ability to isolate applications so that malware infection is unable to spread any further, for example if a user clicks on an infected attachment or plugs in a rogue USB drive. Meanwhile, HP Sure Run [ii] stops malware from closing security software, reinstating them should it detect interference.
Applications, the operating system, devices, users – nothing is automatically trusted, and any trust granted can be withdrawn at any time. What counts is being able to do this in a way that doesn’t require organisations to throw out their current technology or hire expensive analysts to sift through alerts and streams of data. Containment and isolation fulfil this requirement by preventing attacks at the local level. This moves beyond old-style detection by making response more automated and cheaper to live with.
[i] HP Sure Click requires Windows 10 Pro or Enterprise. See for complete details
[ii] HP Sure Run is available on select HP PCs.
You must be logged in to post a comment.