`

    SASE and Zero Trust: The perfect match

    By Kavin
    Published on March 15, 2022

    Hybrid work models and cloud computing have drastically changed how organizations implement their network security strategies to secure their data and infrastructure. Many cybersecurity trends have gained prominence mainly because of the dispersed workforce in the cloud. Among them, two stand out: Secure Access Service Edge (SASE) and Zero Trust.

    What is SASE?

    According to Gartner, "By 2024, at least 40% of enterprises will have explicit strategies to adopt SASE, up from less than 1% at year-end 2018". SASE is a cloud-based security framework that combines wide area networking (WAN) with network and security functions. When implemented correctly, SASE enables users to leverage Firewall as a Service, Zero Trust Network Access (ZTNA), and secure web gateway among other things. As a result, it can provide secure access to the users, data, and devices even when they are not on a corporate network. The benefits of embracing a SASE framework are multifold:

    • It enhances security through ZTNA principles, least-privilege access and identity-based authorization.
    • It minimizes IT overhead and maintenance costs as it replaces multiple disjointed appliances from different vendors with a single cloud-based solution.
    • It results in improved WAN scalability and reduces the need for additional software licenses.

    What is Zero Trust?

    IBM's "Cost of a Data Breach Report 2021" says that organizations that fully deployed Zero Trust saved 43% in data breaches costs. The core of the Zero Trust approach is, "never trust, always verify". It operates on the premise that no user in an organization should be trusted implicitly and each of their digital interactions should be authenticated by least access policies. The implementation of a Zero Trust model combines multi-factor authentication, endpoint security systems, and data encryption systems. These are the key benefits of a Zero Trust model:

    • It reduces organizational and business risks as it imposes access restrictions using the principle of least privilege.
    • It provides complete visibility on access controls across the enterprise as admins can track and monitor the location, time, and devices involved in each access request.
    • It supports the organization's compliance initiatives by making it easier to obtain evidence on access controls.

    Better together: SASE and Zero Trust

    As organizations are increasingly adopting both, they realize that the synergy of SASE and Zero Trust is more efficient. Several of their core principles intertwine and complement each other well.

    Importance to identity

    According to SASE principles, any modifications to policies based on access requirements must be primarily based on the identity of the device, user, or service. Other important factors include the level of risk and trust, the sensitivity of data involved, and identity location, which are also a part of the Zero Trust strategy.

    Better management of user access control

    A cloud access security broker (CASB) is a core component of the SASE framework. When CASB and Zero Trust are implemented together, IT admins can better manage users' access controls. Besides providing the ability to restrict user access to particular resources, CASB supports the synergy of SASE and Zero Trust resulting in improved overall network visibility.

    Context-aware trust levels and dynamic policies

    Multiple tenets in the Zero Trust strategy place an emphasis on dynamic policies and automating user or asset access support decisions. Tracking and monitoring user behavior with automation-driven policy changes is a main element in SASE as well. Gartner recommends that context-aware trust level be embraced, which is a popular approach of Zero Trust.

    While many organizations see SASE and Zero Trust as separate stand-alone processes, embracing both will deliver more value.

    Related Stories

    2020 Zoho Corporation Pvt. Ltd. All rights reserved.