Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture

Traditional networks are designed to be hard on the outside and soft on the inside. It is this soft inside which has made the traditional perimeter model laughable to attackers, who can easily breach a network and run away with the data without even having to deal with the hardened perimeter. The ze...

Volledige beschrijving

Bibliografische gegevens
Hoofdauteurs: Dan Tyler, Thiago Viana
Formaat: Artikel
Taal:English
Gepubliceerd in: MDPI AG 2021-08-01
Reeks:Applied Sciences
Onderwerpen:
Online toegang:https://www.mdpi.com/2076-3417/11/16/7499
_version_ 1827685928213151744
author Dan Tyler
Thiago Viana
author_facet Dan Tyler
Thiago Viana
author_sort Dan Tyler
collection DOAJ
description Traditional networks are designed to be hard on the outside and soft on the inside. It is this soft inside which has made the traditional perimeter model laughable to attackers, who can easily breach a network and run away with the data without even having to deal with the hardened perimeter. The zero-trust security model, created by John Kindervag in 2010, addresses the security flaws of the traditional perimeter model and asserts that all network traffic on the inside should not be trusted by default. Other core principles of zero trust include verification and continuous monitoring of all communication, as well as encryption of all data in transit and data at rest, since the goal of zero trust is to focus on protecting data. Although the zero-trust model was created in 2010, with some of the associated security practices existing even before that, many healthcare organisations are still choosing to focus primarily on securing the perimeter instead of focusing on the vulnerabilities within them. The current COVID-19 pandemic which healthcare providers are struggling with further highlights the need for improvements to security within the network perimeter, as many healthcare providers and vaccine developers are still using vulnerable, outdated legacy systems which could become compromised and indirectly have a detrimental effect on patient care. Legacy systems which are technologically limited, as well as medical devices which cannot be controlled or managed by network administrators, create boundaries to transitioning to a zero-trust architecture. It is challenges like this that have been explored during the research phase of this project in order to gain a better understanding of how a health organisation can adopt zero-trust practices despite the limitations of their current architecture. From the information gathered during this research, a framework was developed to allow a health organisation to transition to a more secure architecture based on the concept of zero-trust. Aspects of the proposed framework were tested in Cisco Modelling Labs (CML), and the results were evaluated to ensure the validity of some of the recommendations laid out in the framework. The main objective of this research was to prove that if a host within the local area network (LAN) were to be compromised, the damage would be limited to that host and would not spread throughout the rest of the network. This was successful after the qualitative research performed in CML. One of the other takeaways from testing the framework in CML was that medical devices could be secured by placing firewalls directly in front of them. This placement of firewalls may seem like an unorthodox approach and was shown to increase latency, but the blocking of all unnecessary traffic on the rest of the network will result in a performance boost and should balance it out in a real-world application.
first_indexed 2024-03-10T09:01:21Z
format Article
id doaj.art-6379460a87f24176a9b5fe34b3bdef1b
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T09:01:21Z
publishDate 2021-08-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-6379460a87f24176a9b5fe34b3bdef1b2023-11-22T06:42:34ZengMDPI AGApplied Sciences2076-34172021-08-011116749910.3390/app11167499Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network ArchitectureDan Tyler0Thiago Viana1Technical and Applied Computing, University of Gloucestershire, Cheltenham GL50 2RH, UKTechnical and Applied Computing, University of Gloucestershire, Cheltenham GL50 2RH, UKTraditional networks are designed to be hard on the outside and soft on the inside. It is this soft inside which has made the traditional perimeter model laughable to attackers, who can easily breach a network and run away with the data without even having to deal with the hardened perimeter. The zero-trust security model, created by John Kindervag in 2010, addresses the security flaws of the traditional perimeter model and asserts that all network traffic on the inside should not be trusted by default. Other core principles of zero trust include verification and continuous monitoring of all communication, as well as encryption of all data in transit and data at rest, since the goal of zero trust is to focus on protecting data. Although the zero-trust model was created in 2010, with some of the associated security practices existing even before that, many healthcare organisations are still choosing to focus primarily on securing the perimeter instead of focusing on the vulnerabilities within them. The current COVID-19 pandemic which healthcare providers are struggling with further highlights the need for improvements to security within the network perimeter, as many healthcare providers and vaccine developers are still using vulnerable, outdated legacy systems which could become compromised and indirectly have a detrimental effect on patient care. Legacy systems which are technologically limited, as well as medical devices which cannot be controlled or managed by network administrators, create boundaries to transitioning to a zero-trust architecture. It is challenges like this that have been explored during the research phase of this project in order to gain a better understanding of how a health organisation can adopt zero-trust practices despite the limitations of their current architecture. From the information gathered during this research, a framework was developed to allow a health organisation to transition to a more secure architecture based on the concept of zero-trust. Aspects of the proposed framework were tested in Cisco Modelling Labs (CML), and the results were evaluated to ensure the validity of some of the recommendations laid out in the framework. The main objective of this research was to prove that if a host within the local area network (LAN) were to be compromised, the damage would be limited to that host and would not spread throughout the rest of the network. This was successful after the qualitative research performed in CML. One of the other takeaways from testing the framework in CML was that medical devices could be secured by placing firewalls directly in front of them. This placement of firewalls may seem like an unorthodox approach and was shown to increase latency, but the blocking of all unnecessary traffic on the rest of the network will result in a performance boost and should balance it out in a real-world application.https://www.mdpi.com/2076-3417/11/16/7499zero-trust networkshealthcarelegacy systems
spellingShingle Dan Tyler
Thiago Viana
Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
Applied Sciences
zero-trust networks
healthcare
legacy systems
title Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
title_full Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
title_fullStr Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
title_full_unstemmed Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
title_short Trust No One? A Framework for Assisting Healthcare Organisations in Transitioning to a Zero-Trust Network Architecture
title_sort trust no one a framework for assisting healthcare organisations in transitioning to a zero trust network architecture
topic zero-trust networks
healthcare
legacy systems
url https://www.mdpi.com/2076-3417/11/16/7499
work_keys_str_mv AT dantyler trustnooneaframeworkforassistinghealthcareorganisationsintransitioningtoazerotrustnetworkarchitecture
AT thiagoviana trustnooneaframeworkforassistinghealthcareorganisationsintransitioningtoazerotrustnetworkarchitecture