Page 115 - Cyber Defense eMagazine September 2022
P. 115

Integrating Zero Trust at the Data Level

            The traditional network-centric approach to zero trust does not address these issues. But what if we
            implemented zero trust, along with attribute-based access controls (ABAC), at the data level instead?
            What would this look like?

            All data would have security labels applied on write, i.e., immediately protected at ingestion. The system
            should be able to handle all data types – structured or unstructured, streaming or static – in their raw
            forms, retaining the data’s original structure to ensure greater flexibility and scalability.


            Attribute-based access control allows resources to be protected by a policy that takes users’ attributes
            and credentials into account, not just their roles, and can allow for more complex rules. And if ABAC is
            used to protect data at a fine-grained level, it ensures that data segregation is no longer necessary. Unlike
            the more common role-based access control (RBAC), which uses course-grained roles and privileges to
            manage  access,  ABAC  is  considered  the  next  generation  of  access  control  because  it’s  “dynamic,
            context-aware and risk-intelligent.” These access controls can be applied at the level of the dataset,
            column, attribute-based row, document/file, and even individual paragraphs. In this scenario, people see
            only the data they need (and are authorized) to see, even if they’re looking at the same file.

            Let’s look at our earlier examples through the lens of zero trust for data. A data analyst could upload
            sensitive information that would be immediately labeled. Even the database administrator would not be
            able to view this information – they can manage the system resources, but not view the confidential data
            therein. Zero trust.

            It gets even more interesting when considering the spreadsheet being managed by our friends Alice and
            Bob. Only one copy of the spreadsheet exists; both Bob and Alice can be looking at it and working on it,
            but each see and have access to only the data appropriate to their credentials. Technically, Bob would
            not even know he’s not seeing all the data. Again, zero trust.




            The Implications of Zero Trust for Data
            So, what would this mean for an organization and its data?


            First, that  data  –  all  data,  across mixed  sensitivities  –  would  be  better protected.  Because  silos  are
            eliminated, all data can be co-located, improving efficiency, and making information immediately available
            for use. Because we’ve now got fine-grained control, we can even apply this zero trust and ABAC to
            search, so that all data, regardless of sensitivity, can be readily indexed and found; users only see the
            results they’re authorized to see. And data scientists can focus on the objectives for their AI and analytics
            work, instead of the infrastructure.

            If  this  sounds  like  fantasy,  it’s  not.  It’s  actually  the  approach  that  prominent  three-letter  government
            agencies use when they have to work with data of mixed sensitivities. That zero trust for data is now
            making its way into commercial and government organizations of all types, and it promises to have a
            major impact on how we work with – and protect – data going forward.






            Cyber Defense eMagazine – September 2022 Edition                                                                                                                                                                                                         115
            Copyright © 2022, Cyber Defense Magazine. All rights reserved worldwide.
   110   111   112   113   114   115   116   117   118   119   120