Zero Trust Authorization requires that users are not authorized by default, and access is only granted when sufficient conditions are met. The following principles should be following when implementing Zero Trust Authorization:
- Apply Authorization Policies at the Granular Level – Defining authorization policies to grant access at the most granular level possible, that access can follow the principles of least privileged access, granting no more access or entitlements than are absolutely necessary
- Enforce Authorization Policies Everywhere – Authorization policies should be defined to protect access and entitlements to all resources, regardless of whether inside an organization’s network or outside the network.
- Enforce Policies for All Access Types – Authorization requests can come from many sources, such as users who are accessing resources directly or applications that are requesting access. Authorization policies should be aware of the context around the origins of the access request, and grant access and entitlements accordingly. For instance, programmatic access to resources may be more limited than manual access to the same resources.
- Automate policy enforcement and logging – Authorization policy evaluation and enforcement should be as automated as possible and all access requests, whether granted or denied, should be logged for later auditing and analysis. This significantly reduces the time and cost requirements of policy development and maintenance, as well as the effort to identify any potential malicious activity.
To comment on this post
Login to NextLabs Community
NextLabs seeks to provide helpful resources and easy to digest information on data-centric security related topics. To discuss and share insights on this resource with peers in the data security field, join the NextLabs community.
Don't have a NextLabs ID? Create an account.