This is a preview of your story

Powered by

Storydoc

 

Stopping Ransomware Attacks with Zero Trust

⏱ Avg. Reading Time: 5 min

expand_more

In May 2021, a group of hackers attacked a VPN that required only a single authentication password and gained access to the organizational network. They then demanded $4.4 million in ransom to return control of the network. In response, the company shut down its operations, which led to a fuel shortage across the east coast of the United States. The Colonial Pipeline ransomware attack was underway, and the cybersecurity industry would never be the same.

Ransomware attacks have grown increasingly common (and expensive) in recent years, but organizations like yours are not doomed to become victims.

Zero trust is a modern and innovative security model designed to severely limit the damage that ransomware and other cyberattacks can cause.

By never inherently trusting users or devices and instead continuously verifying them before granting access, the zero trust framework:

  • lock

    Prevents attackers from gaining easy access to critical applications

  • cancel

    And severely curtails their ability to cause damage if they do get in.

In this e-book, we will examine what zero trust is and outline how to implement zero trust access in order to prevent costly and damaging ransomware attacks.

Topics that we'll cover include


Zero Trust and Ransomware

analytics_default

Ransomware Attacks: A Costly and Worrying Reality

In 2021, the number of ransomware attacks significantly increased compared to 2020, which itself saw a 150% ransomware increase compared to 2019. The number of attacks is expected to grow even more in 2022.

Every month, hundreds of thousands of ransomware attacks will take place, targeting enterprises, businesses and people.

Read more 🔽

Close 🔼

Between 2019 and 2020, the amount paid by ransomware victims rose by 300%

The actual ransom demands made by attackers have also grown in recent years. Between 2019 and 2020, the amount paid by victims rose by 300%. In the first six months of 2021, ransomware payments reported by banks and other financial institutions totaled $590 million. 2021 also saw the largest ransomware demands ever per attack, with attackers demanding tens of millions of dollars following a single breach.

It is clear that existing security controls, designed largely for yesterday’s legacy systems, are no longer sufficient in a world of global networks and complex cloud architectures. To prevent ransomware attacks, a new forward-looking approach is needed: zero trust.

It is clear that existing security controls, designed largely for yesterday’s legacy systems, are no longer sufficient in a world of global networks and complex cloud architectures.

To prevent ransomware attacks, a new forward-looking approach is needed: Zero trust.


What is Zero Trust?


Zero trust is a modern security architecture and model that can help mitigate ransomware attacks.

Zero trust is based on the premise “Never trust, always verify,” which means that no user or machine is granted access (trust) until they are authorized.

The three main principles of Zero Trust are:


fingerprint

Access is granted based on identity, not network origin

rule

Enforce least privilege access for identities and entitlements

report_problem

Assume breach, and continuously monitor and verify

How Does Zero Trust Work?

Zero trust is founded on the principle that no person or device should be granted system access based on inherent trust.

Instead, zero trust assumes that the network has already been compromised. Therefore, no user or device can access systems or assets without first being authorized via strong authentication methods like MFA (multi-factor authentication).

As an added security measure, users are continuously verified even after their initial authorization.

How Zero Trust Helps Mitigate Ransomware

 

Ransomware perpetrators attack networks and critical applications and threaten to leak or destroy valuable data unless a hefty ransom is paid.

 

Zero trust access policies prevent the spread of ransomware.

When zero trust is implemented:

  • app_blocking

    Ransomware attackers are blocked from accessing critical applications.

  • block

    Ransomware attackers are prevented from moving laterally, mitigating their ability to access and leak data.

  • visibility_off

    Ransomware attackers cannot see the different system components, target them and gain a foothold.see

  • record_voice_over

    Auditing and recording capabilities help detect breaches and prevent further damage.

  • dark_mode

    Zero trust blackens the network, preventing attack methods like IP scanning.

  • vpn_lock

    Zero trust enhances potentially vulnerable VPNs by adding an extra layer of security.

Zero trust saves organizational resources.

Instead of providing new employees with secure devices, zero trust enables using their own devices. This is especially useful during an M&A or another period of rapid growth.

analytics_default


Introducing Zero Trust to the Organization

analytics_default

Securing the Organization with Zero Trust

To operationally execute zero trust, it’s important to implement a technology that can secure the following domains:

data_array

Data

person

People

phonelink

Devices

network_check

Networks

work

Workloads

The zero trust technology used to secure these domains is called ZTNA (zero trust network access).


ZTNA is a software perimeter that applies the zero trust principles when authorizing users and services.

analytics_default

ZTNA vs. VPNs

Many organizations use VPNs to secure their critical applications, especially when providing access for remote users and third parties like partners and contractors.

However, VPNs are not secure.

First, VPNs provide external users with too much access. Any authenticated user has access to the entire network, including databases and infrastructure.

In addition, VPNs providers often have major security vulnerabilities - as recent security incidents such as the Solar Winds cyberattack have demonstrated.

ZTNA implementation increased during the pandemic as a solution for VPN latency and to ensure employee productivity while working from home.

analytics_default

Choosing a ZTNA Provider

The zero trust tenet of “never trust, always verify” also relates to the vendors that provide zero trust access solutions.

Quite paradoxically, most ZTNA providers actually demand inherent trust from their customers by requiring those customers to place their most sensitive assets, including encrypted content, passwords, and user data, in the provider’s cloud.

Think of a parking valet, who holds the keys to all the cars in the lot. Rather than attacking individual car owners, a thief’s best bet would clearly be to attack the valet with his many keys.

In this same way, security vendors are a tempting target for cybercriminals. This includes ZTNA providers who have access to the crown jewels of all their customers. In light of this reality, it is recommended to choose a ZTNA vendor whose architecture cannot potentially compromise your organization.

Ask these 7 questions when selecting a ZTNA provider to ensure you don’t have to trust anyone – even the provider themselves.

  • lock_open

    Is the users’ data exposed?

  • rule

    Who has control of the access rules?

  • password

    Where are our secrets (passwords, tokens, private keys) kept?

  • manage_accounts

    How is the risk of internal threats mitigated?

  • network_locked

    What is the scope of secure access? Does it include users, networks, apps, etc.?

  • cloud_queue

    What is the ZTNA provider’s infrastructure? Are the servers located in the cloud or in a data center? Who can access it?

  • report_problem

    What happens if the ZTNA provider is compromised? Is the organization still secure?


Implementing Zero Trust in the Organization

analytics_default

A Phased Approach to Zero Trust Adoption

IT and security teams often worry about how long the process of implementing zero trust will take and when they will start to see value.

Adopting zero trust is indeed a journey, not a one-off task. However, time to value can still be quite fast.

It is recommended to take a three phased approach to zero trust implementation.

"Rome wasn’t built in a day - but they were laying bricks every hour."

John Heywood, English playwright

analytics_default

3 Phases of Zero Trust Adoption

Conclusion


Ransomware is putting everyone at risk - from small startups to large global enterprises. And unfortunately, the threat isn't like to go away anytime soon.

Security and IT teams can help secure their organizations and users by implementing zero trust as a secure alterantive or complement to VPNs. Zero trust access policies make it substantially more difficult for ransomware attackers to access critical applications, move laterally within networks, exploits VPN vulnerabilities or exfiltrate sensitive data.

Discover how easy it is to start you Zero Trust journey with Cyolo

Book a commitment-free demo to learn more