{"id":14954,"date":"2023-11-30T10:58:32","date_gmt":"2023-11-30T10:58:32","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14954"},"modified":"2023-11-30T10:58:34","modified_gmt":"2023-11-30T10:58:34","slug":"what-is-zero-trust-network-access-ztna","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/cyber-security\/what-is-zero-trust-network-access-ztna\/","title":{"rendered":"What Is Zero Trust Network Access (ZTNA)?","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n

The purpose of Zero Trust Network Access (ZTNA) is to provide security by authenticating users and authorizing them to utilize designated apps in accordance with predefined identity and context policies. The elimination of implicit trust in ZTNA limits network mobility and lowers attack surfaces. This article entails everything you need to know about ZTNA including the vendors. Enjoy the ride!<\/p>\n\n\n\n

What Is ZTNA?<\/span><\/h2>\n\n\n\n

 Zero Trust Network Access, is a cutting-edge method of safeguarding remote and on-premises user access to applications and services. ZTNA operates on the simple tenet of denying access to any resource to anybody or anything unless specifically authorized. This method allows for more stringent network and data security with the use of micro-segmentation, which can hinder lateral movement in the event of a compromise.<\/p>\n\n\n\n

In conventional VPN-based network architectures, authorized users are granted unrestricted access to all resources inside their local subnet. Unauthorized users can only access a resource with a password. ZTNA changes that perspective. Users are limited to what their company’s security policy specifically permits them to “see” in terms of applications and resources.<\/p>\n\n\n\n

How Does ZTNA Work?<\/span><\/h2>\n\n\n\n

Every company or provider has a somewhat different configuration for ZTNA. Nonetheless, there are a few fundamental ideas that apply to all ZTNA architectures:<\/p>\n\n\n\n

#1. Network vs. application access <\/span><\/h3>\n\n\n\n

ZTNA handles network access and application access differently. An application is not always accessible to a user just because they have connected to a network.<\/p>\n\n\n\n

#2. IP addresses that are hidden <\/span><\/h3>\n\n\n\n

ZTNA keeps IP addresses hidden from the network. With the exception of the application or service they are linked to, connected devices cannot see the rest of the network.<\/p>\n\n\n\n

#3. Security of devices<\/span><\/h3>\n\n\n\n

ZTNA has the ability to take into account device security posture and risk when making access decisions. It accomplishes this by either monitoring network data going to and from the device or by running software on the device itself.<\/p>\n\n\n\n

#4. Extra factors<\/span><\/h3>\n\n\n\n

ZTNA can assess the risks associated with several elements, including the user’s location, the timing and frequency of requests, the apps and data being requested, and more, in contrast to traditional access control, which only provides access based on user identity and role. Even if a user signs in to a network or application, access is blocked if the device is untrusted.<\/p>\n\n\n\n

#5. Absence of MPLS<\/span><\/h3>\n\n\n\n

ZTNA does not use MPLS-based WAN connections; instead, it leverages encrypted Internet connections over TLS. Private MPLS connections form the foundation of conventional corporate networks. Instead, ZTNA is constructed on the open Internet and encrypts network traffic using TLS. Instead of linking a user to a wider network, ZTNA creates tiny encrypted tunnels between a user and an application.<\/p>\n\n\n\n

#6. SSO and IdP <\/span><\/h3>\n\n\n\n

The majority of ZTNA solutions interface with different single sign-on (SSO) platforms, identity providers (IdPs), or both. Through SSO, users can verify their identity for any application; the IdP keeps track of user identity and establishes the permissions that go along with it.<\/p>\n\n\n\n

#7. Service vs agent<\/span><\/h3>\n\n\n\n

ZTNA has two possible configurations: cloud-based or endpoint-based. <\/p>\n\n\n\n

The Functions of ZTNA<\/span><\/h2>\n\n\n\n

ZTNA carries out four crucial tasks:<\/p>\n\n\n\n