skip to main content
10.1145/3472716.3472865acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster

Federating trust: network orchestration for cross-boundary zero trust

Published:23 August 2021Publication History

ABSTRACT

Zero Trust is an emerging security paradigm that does away with implicit zones of trust commonly employed within static, defense-in-depth, enterprise architectures. One of the core tenets of Zero Trust is that resource access is determined by dynamic policy - an intersection of trust in a user, the supporting application or service, the underlying network, and the devices which hold or process data. Establishing this overall assessment of trust serves well for centralized architectures where an administrator can establish and assess each of these trust enablers, such as in an enterprise network. However, shifting workloads to remote access, bring your own device (BYOD), and cloud hosting of collaborative services, to name a few, all challenge the ability of an administrator to effectively establish a complete Zero Trust architecture due to the inability to fully trust each component.

This shift away from centrally managed architectures reveal a significant challenge in achieving complete Zero Trust: security is a function of many interactions, many of which an administer has no control over. Recently the term "Zero Trust 2.0" was coined as an evolution to Zero Trust which establishes identity as the new perimeter via an orchestration layer and machine learning capabilities~\cite{trust}. However, this functionality still remains tied to centrally controlled architectures where an administrator can link together products and solutions to achieve a desired level of security. We argue that this orchestration needs to expand beyond these common enterprise boundaries in a way that trust can be guaranteed across disparate systems, networks, and servicers. Similar to identity federation, where a user can use credentials from one provider to access another competitors platform, federation of trust should serve as a guarantee for security across networks. In the remaining sections we propose what this trust federation mechanism could potentially look like.

References

  1. A. Nooriala, Zero Trust 2.0: The Perfect Balance Between Convenience and Security, CPO Magazine, 2020. [2]S. Rose, et. al., Zero Trust Architecture, National Institute of Standards and Technology, 2019.Google ScholarGoogle Scholar

Index Terms

  1. Federating trust: network orchestration for cross-boundary zero trust

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGCOMM '21: Proceedings of the SIGCOMM '21 Poster and Demo Sessions
          August 2021
          94 pages
          ISBN:9781450386296
          DOI:10.1145/3472716

          Copyright © 2021 Owner/Author

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 23 August 2021

          Check for updates

          Qualifiers

          • poster

          Acceptance Rates

          SIGCOMM '21 Paper Acceptance Rate30of56submissions,54%Overall Acceptance Rate554of3,547submissions,16%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader