Article

Zero Trust & Micro-Segmentation Explained

Zero trust
Time to read: 3 minutes

Zero Trust and micro-segmentation are designed to help organizations stop malicious attacks at a time when the cybersecurity landscape is becoming increasingly complex. But what exactly is meant by Zero Trust and micro-segmentation? And what does this approach involve?

What is Zero Trust?

Zero Trust is a security model designed to address today’s complex hybrid cloud world by taking a “never trust, always verify” approach to security. The concept, first coined by John Kindervag while working at Forrester Research, is based on the realization that traditional security models work on the false assumption that all users inside an organization’s network can be trusted.

By contrast, the Zero Trust model sees trust as a vulnerability. It recognizes that malicious threats may be either external or internal—and that once inside a network, external cybercriminals and malicious insiders are free to move around and access a wide range of data. Zero Trust seeks to put an end to this broken security model by requiring strict identity and device verification no matter where the user is located in relation to the network perimeter.

What is micro-segmentation?

Historically, companies have relied on the “flat network,” where getting onto the network made it possible to access all corporate applications and data. Yet to improve their security posture, many organizations today use network segmentation in which they split their computer network into different sub-networks or zones to limit movement once unauthorized access is gained. By limiting access to sensitive information only to the people, applications, and servers that need it, organizations create a bigger barrier to their most sensitive information—for example, by storing customer credit card data in a different zone from areas of the network where third parties have access. Users who have access to a specific zone can move freely within that zone, but to move between zones, their identity must be re-verified.

Micro-segmentation takes this division a step further by partitioning the network into even smaller zones up to the individual workload level. By tying fine-grained security policies to each individual application workload, micro-segmentation further limits attackers’ ability to move laterally inside the network should the perimeter be breached.

Benefits of micro-segmentation.

A micro-segmentation approach to security has several advantages compared to the network segmentation and flat network approaches of the past. These include:

How micro-segmentation fits into a Zero Trust model.

Zero Trust is a security model, and micro-segmentation is a best practice that can help organizations realize that vision. By creating a secure perimeter zone around each workload, micro-segmentation eliminates the zones of trust that allowed attackers to freely move around within the network.

Zero Trust grants user access according to the principle of “least privilege,” which provides only enough access for each user to successfully perform their jobs—and nothing more. Micro-segmentation makes it possible for organizations to better apply this principle by requiring verification on a more granular scale.

Eliminating vulnerable zones of trust.

Micro-segmentation enables companies to implement a Zero Trust model by erecting secure micro-perimeters around specific application workloads. By obtaining granular control over their most sensitive applications and data, organizations can eliminate zones of trust that increase their vulnerability. With fine-grained control of traffic flows between every workload, companies can decrease their threat attack surface and more easily contain incidents that do occur—reducing their risk of a major security breach that compromises their business and their customers.

Take control of your cloud platform.

Learn more about SailPoint Identity Security.