HT TECH wants to start sending you push notifications. Click allow to subscribe

'Trust no one' becomes cyber mantra after massive hacking attacks

In the wake of two massive cyber-attacks that exposed glaring deficiencies in US defenses, government officials and cybersecurity practitioners are saying zero-trust may be the way to stop the cyber mayhem.

By: BLOOMBERG
Updated on: Aug 21 2022, 16:02 IST
In many existing computer networks, once an individual has logged into the system, they can move freely and access information without further verification. (Pixabay)
In many existing computer networks, once an individual has logged into the system, they can move freely and access information without further verification. (Pixabay)

Researcher John Kindervag published a paper about a decade ago that argued administrators of sensitive computer networks shouldn’t trust anyone on their networks, regardless of their title.

It’s not good enough simply to try to keep bad guys out of your network, he argued. You also have to put strict limits on the people already inside, thus the shorthand for the security model: “zero trust.”

You may be interested in

Mobiles Tablets Laptops
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
₹156,900
Check details
28% OFF
Samsung Galaxy S23 Ultra 5G
  • Green
  • 12 GB RAM
  • 256 GB Storage
₹107,999₹149,999
Buy now
Google Pixel 8 Pro
  • Obsidian
  • 12 GB RAM
  • 128 GB Storage
₹106,998
Check details
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage
₹87,900
Check details
7% OFF
Microsoft Surface Pro 8 8PV 00029
  • Graphite Black
  • 16 GB DDR4 RAM
  • 256 GB SSD
₹139,999₹149,999
Buy now
47% OFF
Microsoft Surface 4 5UI 00049
  • Platinum Silver
  • 8 GB DDR4 RAM
  • 256 GB SSD
₹98,000₹186,500
Buy now
6% OFF
Microsoft Surface Go THH 00023
  • Platinum
  • 8 GB DDR4 RAM
  • 128 GB SSD
₹94,799₹100,999
Buy now
2% OFF
Microsoft Surface Pro 7 Plus TFM 00013
  • Platinum
  • 8 GB RAM
  • 128 GB SSD
₹78,990₹80,999
Buy now
35% OFF
Xiaomi Pad 6
  • Mist Blue
  • 6 GB RAM
  • 128 GB Storage
₹25,999₹39,999
Buy now
55% OFF
Lenovo Tab M10 5G
  • Abyss Blue
  • 6 GB RAM
  • 128 GB Storage
₹20,999₹47,000
Buy now
32% OFF
Realme Pad 2
  • Imagination Grey
  • 6 GB RAM
  • 128 GB Storage
₹19,668₹28,999
Buy now
Honor Pad X9
  • Gray
  • 4 GB RAM
  • 128 GB Storage
₹16,998
Check details

“People told me I was crazy,” Kindervag said of the 2010 report. But the cybersecurity approach has slowly gained followers over the years, as government agencies and private businesses have been continually pummeled by computer hacks.

Now, in the wake of two massive cyber-attacks that exposed glaring deficiencies in US defenses, government officials and cybersecurity practitioners are saying zero trust may be the way to stop the cyber mayhem. In February, the National Security Agency issued guidance urging the owners of networks related to national security and critical infrastructure to adopt zero trust.

In many existing computer networks, once an individual has logged into the system, they can move freely and access information without further verification. It’s what some cybersecurity experts describe as a “castle and moat” approach, protecting perimeter security by investing in firewalls, proxy servers and other intrusion prevention tools and assuming activity inside the castle walls is mostly safe.

Also read: Microsoft updates Defender Antivirus to mitigate Exchange server vulnerabilities

Zero trust takes a different approach, assuming that anyone that logs on is suspicious and preventing them from moving freely through the system – such as accessing the other devices and networks connected to it – without authenticating their credentials for each additional connection.

In other words, zero trust “reduces or prevents lateral movement and privilege escalation,” said George Kurtz, the chief executive officer of the cybersecurity firm Crowdstrike Holdings Inc., speaking at a February Congressional hearing.

The embrace of zero trust has occurred in part because of US failures to prevent major breaches linked to Russia and China. For example, following the 2015 revelation that Chinese hackers had breached the US Office of Personnel Management, stealing sensitive security clearance data on millions of Americans, a congressional report called for adding the zero trust model to government networks. But so far, more than a half a decade later, zero trust remains an aspirational goal across much of the US government.

But calls for zero trust accelerated in recent months after suspected Russian hackers compromised popular software from Texas-based firm SolarWinds Corp. In that highly sophisticated attack, which was disclosed in December, the hackers inserted malicious code into updates for SolarWinds software, which was received by as many as 18,000 of its customers. At least nine government agencies and 100 private companies were targeted by the hackers for further infiltration.

The other major cyber-attack, disclosed this month and linked to China, exploited vulnerabilities in Microsoft Corp.’s software for email. Hackers used flaws in the code of Microsoft Exchange to break into tens of thousands of organizations, according to cybersecurity experts.

Zero trust may not have blocked the hacks, experts said, but they likely would have limited the damage. At the very least, the security measure would have have given the US a better chance to detect the attackers’ movements, keeping them from traveling as freely across government and private sector networks.

At a March 18 hearing on the SolarWinds attack, US Chief Information Security Officer Christopher DeRusha said he is working with US government agencies to implement zero trust because it “prevents adversaries from the kind of privilege escalation that was demonstrated in the SolarWinds incident.” In addition, Microsoft, which has advocated for zero trust, found that targeted victims in the SolarWinds attack whose systems had embraced the model were more resilient following the attack, according to the company’s director of identity security, Alex Weinert.

But adopting a zero trust model can be costly and time-consuming. In extreme instances, it may require organizations to rip out existing computer equipment and replace it – to make certain there isn’t any malware hidden deep inside the network.

Read more: At least 10 hacking groups using Microsoft software flaw

“If US government investigators can’t pinpoint each agency’s exposure to the malware, it may be forced to assume that most every department within the federal government has been compromised. This scenario would produce the daunting, perhaps impossible task of purging all malware from federal networks,” said John Bambenek, a cybersecurity investigator. “Eradicating the Russian malware would require agencies to rip and replace their network infrastructure.”

But given the persistent threats from adversaries, the US government may not have years to find a fix. As a result, a more likely outcome for its networks may be some sort of compromise, adding zero trust where possible and relying on less drastic cybersecurity fixes elsewhere, including encrypting data, fully staffing cyber positions and ensuring that only a small number of individuals have access to highly sensitive information.

“Zero trust is the buzzword du jour,” said James Lewis, who serves senior vice president and director of the strategic technologies program at the Center for Strategic and International Studies. But he added that ripping out and replacing networks seems impractical. “We haven’t done the basics. So, why immediately go to the nuclear option?”

Since publishing his paper, Kindervag, who now works at the cybersecurity company On2it, which describes itself as “zero trust innovators,” has continued to promote his approach across the public and private sector. But he, too, recommends a gradual approach.

“You don’t secure a road by ripping out a road and putting a new road in. You figure out how to put stoplights in, or you figure out how to change the exit ramps,” he said. “We need to do the same thing with networks and not do things that will never happen–but do things that we can accomplish using the people and technologies we have today.”

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on ,Twitter, Facebook, , and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 25 Mar, 17:59 IST

Sale

Mobiles Tablets Laptops
4% OFF
Samsung Galaxy S24 Ultra
  • Titanium Black
  • 12 GB RAM
  • 256 GB Storage
₹129,999₹134,999
Buy now
7% OFF
Apple iPhone 15 Pro Max
  • Black Titanium
  • 8 GB RAM
  • 256 GB Storage
₹148,900₹159,900
Buy now
13% OFF
Xiaomi 14
  • Matte Black
  • 12 GB RAM
  • 512 GB Storage
₹69,999₹79,999
Buy now
8% OFF
Apple iPhone 15 Plus
  • Black
  • 6 GB RAM
  • 128 GB Storage
₹82,600₹89,900
Buy now
33% OFF
Xiaomi Pad 6
  • Mist Blue
  • 6 GB RAM
  • 128 GB Storage
₹26,999₹39,999
Buy now
53% OFF
Lenovo Tab M10 5G
  • Abyss Blue
  • 6 GB RAM
  • 128 GB Storage
₹21,999₹47,000
Buy now
31% OFF
Realme Pad 2
  • Imagination Grey
  • 6 GB RAM
  • 128 GB Storage
₹19,999₹28,999
Buy now
24% OFF
Samsung Galaxy Tab A7 Lite
  • Silver
  • 3 GB RAM
  • 32 GB Storage
₹9,710₹12,700
Buy now
23% OFF
Infinix INBook X1 Neo XL22 Laptop Intel Celeron Quad Core 8 GB 256 GB SSD Windows 11
  • Blue
  • 4 GB RAM
  • 128 GB SSD
₹22,990₹29,990
Buy now
27% OFF
Asus Zenbook 14 Flip OLED UP3404VA KN753WS Laptop
  • Foggy Silver
  • 16 GB RAM
  • 1 TB SSD
₹94,500₹128,990
Buy now
23% OFF
Acer Predator Helios 300 PH315 54 NH QC5SI 006 Laptop
  • Abyssal Black
  • 16 GB RAM
  • 512 GB SSD
₹92,990₹119,990
Buy now
31% OFF
Asus VivoBook S15 OLED K3502ZA L501WS Laptop
  • Neutral Grey
  • 16 GB RAM
  • 512 GB SSD
₹67,990₹98,990
Buy now
NEXT ARTICLE BEGINS