You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

18 April 2023

Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust

,
,
and
Department of Convergence Security, Kangwon National University, Chuncheon-si 24341, Republic of Korea
*
Authors to whom correspondence should be addressed.
These authors contributed equally to this work.

Abstract

The rapid expansion of remote work following the COVID-19 pandemic has necessitated the development of more robust and secure endpoint device security solutions. Companies have begun to adopt the zero trust security concept as an alternative to traditional network boundary security measures, which requires that every device and user be considered untrustworthy until proven otherwise. Despite the potential benefits of implementing zero trust, the stringent security measures can inadvertently lead to low availability by denying access to legitimate users or limiting their ability to access necessary resources. To address this challenge, we propose a risk-scoring algorithm that balances confidentiality and availability by evaluating the user’s impact on resources. Our contributions include (1) summarizing the limitations of existing risk scoring systems in companies that implement zero trust, (2) proposing a dynamic importance metric that measures the importance of resources accessible to users within zero trust systems, and (3) introducing a risk-scoring algorithm that employs the dynamic importance metric to enhance both security and availability in zero trust environments. By incorporating the dynamic importance metric, our proposed algorithm provides a more accurate representation of risk, leading to better security decisions and improved resource availability for legitimate users. This proposal aims to help organizations achieve a more balanced approach to endpoint device security, addressing the unique challenges posed by the increasing prevalence of remote work.

1. Introduction

Remote work has expanded in many companies following the COVID-19 pandemic. Traditionally, the network boundary security concept has been used to maintain security for remote work. The network boundary security concept separates internal and external networks and restricts access at the network boundary. In this concept, remote access to internal networks is assumed to be access that can be trusted. However, as remote work increases, the limitations of boundary security are emerging owing to vulnerabilities in remote solutions and the large variety of access devices [,,]. Before the expansion of remote work, access to company networks was possible on a limited number of devices that had previously been provided and inspected by the companies. However, as remote work expands, employees can use personal devices to access company data from outside company networks. The conventional boundary security concept has limitations in that it is difficult to control access from vulnerable or already infected devices when internal networks are accessed. As the limitations of boundary security became apparent, there was a need for new security methods to compensate for these limitations and allow for secure remote work. Consequently, the zero trust concept was proposed as a new security paradigm that improves upon boundary security. Zero trust is a security concept in which no activity is trusted, and verification must be performed constantly [,,]. Contrary to the conventional boundary security approach, when zero trust is implemented, risk scoring is performed to verify all devices each time a resource access request is made, and access authorization is determined according to the results of the scoring [,,].
The advantage of zero trust is that it ensures the security and safety of company resources by not trusting and constantly performing risk scoring according to the same criteria when access requests arrive [,]. However, when risk scoring is performed according to the same criteria for all users, resources become more secure, but there is a disadvantage in that the resources may become less available. Availability refers to the degree to which a permitted user can access requested resources promptly. Decreased availability implies that it takes a considerable time or it is difficult to access resources when a user makes a request for access. For example, consider a shopping mall that has implemented zero trust where access requests are made by employees who are allowed to read customer information as well as interns who have low-level permissions. In this case, if risk scoring is performed according to the same high-level criteria that are used for employees with high-level permissions, interns with low-level permissions will only be allowed access after going through high-level security procedures. As such, it may be difficult to follow the security procedures, and accessing resources may become inconvenient, thus decreasing availability. Conversely, if risk scoring is performed according to the same low-level criteria, it can decrease confidentiality and even lead to security incidents if the standard for employee devices that can access customers’ personal information is lowered and important resources are accessed. Consequently, a risk-scoring algorithm that inspects all users with the same criteria is inefficient in terms of system security and availability.
To increase the confidentiality and availability of systems that implement zero trust, in this study, we propose (1) a “dynamic importance metric” for evaluating importance according to the user’s role and resource access permissions and (2) a risk-scoring algorithm based on the Common Configuration Score System (CCSS) base metric, which dynamically changes its security demands according to importance as evaluated by the dynamic importance metric. CCSS is a standard framework that assigns scores to the security vulnerabilities of equipment in IT systems and checks them.
The contributions of this study are as follows.
I. Summarize and describe the limitations of the risk-scoring system that is used in companies that currently implement zero trust.
II. Propose a dynamic importance metric that can measure the importance of resources that are accessible to users within systems that implement zero trust.
III. Propose a risk-scoring algorithm that uses the dynamic importance metric to efficiently increase security and availability for users who are accessing resources in systems that implement zero trust.
The remainder of this paper is organized as follows. Section 2 describes the necessity of risk scoring in systems that implement zero trust as well as trends in risk scoring. In addition, it describes CCSS, which is a framework that evaluates vulnerabilities in devices’ system settings. Section 3 presents the proposed dynamic importance metric for evaluating importance according to users’ roles and resource access permissions and the zero trust-based risk-scoring approach for user devices that employs the dynamic importance metric. Section 4 presents conclusions and future research directions.

3. Proposed User Device Risk Scoring for Zero Trust Access

In this section, we propose (1) a dynamic importance metric that measures the dynamic importance effect that occurs during security events according to the users’ roles and resource access permissions and (2) a risk-scoring algorithm that uses the dynamic importance metric. (1) The dynamic importance metric measures the importance of the resources that can be accessed by the user in the system. (2) The risk-scoring algorithm that uses the dynamic importance metric can perform scoring using different criteria for each user. This risk-scoring algorithm can perform risk scoring using stricter criteria for users who have important permissions and less strict criteria for users without important permissions. Ultimately, it can efficiently increase confidentiality and availability for users who access resources in the system. The dynamic importance metric comprises two elements: accessible resource and resource importance. These two importance-based elements are applied as weights to the values of the evaluations of user device configurations when users access resources.
Next, we propose a risk-scoring algorithm that adds the dynamic importance metric. The risk-scoring algorithm with the additional dynamic importance metric is based on the CCSS base score and adds role-based access control (RBAC) concepts, such as user company position permissions and departments. A risk-scoring approach that reflects users’ resource access levels can aid in efficient corporate zero trust implementations. In zero trust, the users and systems that request access to resources must pass through strict user authentication and device risk-scoring. In short, resources cannot be accessed if an entity cannot be trusted. Thereby, performing risk scoring on all users who attempt to access resources is an important factor for companies that implement zero trust. However, these companies perform risk scoring with the same criteria rather than using different criteria for each user even though there are various users with various permissions and goals. In addition, relevant studies have not been conducted. Therefore, for companies that want to implement zero trust, in this study, we propose a user device risk-scoring algorithm that also reflects the importance of the resources that can be accessed.

3.1. Dynamic Importance Metric

This section describes the dynamic importance metric, which can measure the dynamic importance effect that occurs during security incidents according to the users’ roles and resource access permissions. Figure 5 shows the overview of the dynamic importance metric. As shown in the figure, the dynamic importance metric comprises (1) accessible resource (AR), which measures the permissions that the user needs to access resources, and (2) resource importance (RI), which measures the importance of the resources. The new dynamic importance metric is used in the proposed risk-scoring algorithm in addition to the CCSS base metrics.
Figure 5. Overview of Dynamic Importance Metric with Base Metrics.
(1) Accessible resource shows the permissions needed to access resources. For example, there is a clear difference in the permissions needed by a company employee and a department manager to access company resources. Therefore, accessible resource refers to the extent of the company resource permissions that are granted by workers’ ranks, such as intern, manager, director, and president.
(2) Resource importance indicates the importance of company resources. For a resource that is subject to a user access request, resource importance indicates the effect that an attack on that resource would have on availability, confidentiality, and integrity. For example, suppose that an employee is a member of the human resources department. In this case, the employee can access human resources information. If the employee were a member of the security department, they could access the company security systems’ resources. Here, resource importance measures the effect of attacking each resource, and it evaluates the importance of the resources that can be accessed by the employees. Therefore, the dynamic importance metric, which comprises two elements, performs the role of assigning weight values to the confidentiality impact, integrity impact, and availability impact according to the extent of the permissions assigned to company resources according to the users’ ranks and departments.

Dynamic Importance Metric Vector Diagram

This section explains the dynamic importance value generation flow chart. In Figure 6 and Figure 7, the dynamic importance metric vectors are added to the CCSS scores and used in the risk-scoring algorithm. Accessible resource and resource importance, which are elements of the dynamic importance metric, are evaluated according to the effect that user permissions have on CIA. For accessible resource, the metric’s value is set as none, partial, or complete by comprehensively considering whether the user can access confidential or important resources or has permission to add, modify, or delete resources.
Figure 6. Accessible resource diagram.
Figure 7. Resource importance diagram.
One method for applying dynamic importance vectors to company employee device scoring is to generate vector values by differentiating users’ responsibilities and their position of office. For example, it is assumed that vulnerabilities in the security configurations of IT development team members will expose development source code or the structures of enterprise databases and affect or harm most services. In such cases, the accessible resource and resource importance values can be considered complete.

3.2. Device Risk-Scoring Algorithm for Zero Trust

In this section, we compare CCSS base scores with the risk-scoring algorithm and derive evaluation scores by applying an algorithm based on Algorithm 2 to several security items, and the result is in Table 1. In the proposed algorithm, constants that correspond to the dynamic importance metrics are applied as weight values to the base scores.
Algorithm 2 Risk scoring algorithm
  • R i s k S c o r e = r o u n d _ t o _ 1 _ d e c i m a l (((0.6 × I m p a c t ) + (0.4 × E x p l o i t a b i l i t y ) − 1.5) × f ( I m p a c t ) )
  •  
  • I m p a c t = (5.41 + D y n a m i c I m p o r t a n c e ) × (1 − (1 − C o n f I m p a c t ) × (1 − I n t e g I m p a c t ) × (1 − A v a i l I m p a c t )
  •  
  • D y n a m i c I m p o r t a n c e = A c c e s s i b l e R s o u r c e + R e s o u r c e I m p o r t a n c e
  •  
  • A c c e s s i b l e R e s o u r c e = case A c c e s s i b l e R e s o u r c e of
  •          n o n e : 0.0
  •          p a r t i a l : 1.25
  •          c o m p l e t e : 2.5
  • R e s o u r c e I m p o r t a n c e = case R e s o u r c e I m p o r t a n c e of
  •          n o n e : 0.0
  •          p a r t i a l : 1.25
  •          c o m p l e t e : 2.5
Table 1. Example table of risk-scoring algorithm.
The method for calculating scores using the risk-scoring algorithm is as follows. For example, suppose that two employees in the human resources department access human resources information resources. If risk scoring is performed for the aforementioned PC “automatic login is set up” risk-scoring item, the CCSS vector is “AV:L/AC:L/Au:N/C:P/I:P/A:I” and the base score is 4.6. By using the proposed dynamic-importance-metric-based risk-scoring algorithm, the following scores can be calculated for two company positions.
#1. In the case of an intern: The dynamic importance metric’s accessible resource (AR) is none because the user has few permissions for accessing resources. The resource importance (RI) can be considered complete because the resource is human resources information.
#2. In the case of a manager: The dynamic importance metric’s accessible resource (AR) is complete because the user has high-level permissions that can access resources and affect them by reading, writing, etc. The resource importance (RI) can be considered complete because the resource is human resources information.
In the two examples, a value of “AR:N/RI:C/” is calculated for the intern, and a value of “AR:C/RI:C/” is calculated for the manager. Here, when the proposed risk scoring equation was used to calculate the dynamic importance metrics, the intern’s value was 3.3 points, and the manager’s value was 4.6 points. As a second example, the CCSS base score for “USB AutoRun” is calculated as follows. AV is local because the USB must be physically inserted. AU is none, and the AC is low because the USB automatically runs. In this case, there is an overall complete impact on the CIA of the user PC. Therefore, the CCSS vector is “AV:L/Au:N/AC:L/C:C/I:C/A:C”, and the base score is fairly high at 7.2 points. Here, the method for using the dynamic importance metric is explained using the two groups (1) AR:C/IR:C and (2) AR:C/IR:C as examples. AR evaluates the confidentiality, availability, and integrity of resources according to the permissions granted to the employee’s position in the company. It is divided into none, partial, and complete by considering access permissions for important documents. RI evaluates confidentiality, availability, and integrity according to the resources requested by the department, and it is divided into none, partial, and complete. An instance of a resource could be data that is public even to users with low-level permissions, or it could be confidential data that contains important internal company information. As such, various vectors from AR:C/RI:C to AR:N/RI:N could be used as the CCSS vector for “USB Autorun” according to the company resource.
#1 AR:C/IR:C: The user requests important confidential data within the company, and they have high-level resource permissions.
#2 AR:N/RI:N: The user requests data that is public to even users with low-level permissions, and the user has low-level resource permissions.
In case #1, a score of 7.2 points is found when the dynamic-importance-metric-based risk-scoring algorithm is applied because the vector is AR:C/IR:C. In case #2, a score of 3.8 points is found when the dynamic-importance-metric-based risk-scoring algorithm is applied because the vector is AR:N/RI:N. In the case of AR:C/IR:C, the CCSS base score is not affected by the dynamic importance metric, and a score of 7.2 points is produced. This is because in the case of AR:C/IR:C, important confidential data is accessed, and the user has high-level permissions; therefore, there is no need to relax the criteria for risk scoring. Conversely, in the case of AR:N/RI:N, a user with low-level permissions is requesting access to data that can easily be accessed by users with low-level permissions; therefore, relaxed criteria are applied, giving consideration to availability. The table below shows examples of applying the risk-scoring algorithm to typical security configurations for two groups, (1) AR:C/IR:C and (2) AR:N/RI:N.

4. Conclusions

As the number of companies implementing remote work is increasing, many employees are using personal devices to access company data from outside of company networks. Accordingly, there is a need for new security methods that can overcome the limitations of existing boundary security to allow for safe remote work. A new security paradigm known as zero trust has emerged as a method to improve the existing boundary security approach, and many organizations are introducing zero trust solutions and services. In zero trust, inspections, such as risk scoring, which ensure security and identify vulnerabilities in devices that request access to an organization’s resources, are important elements that must be performed each time a user requests a resource [,]. In this study, we proposed an algorithm that resolves the imbalance between security and availability that occurs when risk scoring is performed according to the same criteria for all users, as is currently performed at many companies.
We (1) analyzed trends in device risk scoring at companies that implement zero trust and have shown the limitations of risk scoring as it is currently performed, and (2) proposed a dynamic importance metric with weight values for scoring standards that vary according to resource importance as well as a risk-scoring algorithm that applies the dynamic importance metric. These tools make it possible to perform risk scoring, which changes dynamically according to the user’s role and resource access permissions. In addition, we (3) described the use of case scenarios for the proposed algorithm in regard to several security configuration items.
If the proposed dynamic-importance-metric-based risk-scoring algorithm were to be introduced to systems that implement zero trust, users’ resource access requests could be controlled efficiently by assigning weight values based on information regarding the users rather than solely using information regarding users’ device security configurations when establishing policies on user resource access. This is expected to contribute to efficiently improving security and availability for users accessing resources in companies that implement zero trust. For future research directions, additional studies will be conducted on security items according to user impact, applying the dynamic-importance-metric-based risk scoring.

Author Contributions

Investigation, U.H.P. and J.-h.H.; writing—original draft, U.H.P. and J.-h.H.; supervision, K.H.S. and A.K.; writing—review and editing U.H.P., J.-h.H., A.K. and K.H.S. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Institute of Information & Communications Technology Planning & Evaluation (IITP) grant funded by the Korean government (MSIT) (No. 1711193798, Zero Trust technology based access control and abnormal event analysis technology development for enterprise network protection in the untact era).

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Waizenegger, L.; McKenna, B.; Cai, W.; Bendz, T. An affordance perspective of team collaboration and enforced working from home during COVID-19. Eur. J. Inf. Syst. 2020, 29, 429–442. [Google Scholar] [CrossRef]
  2. Green, N.; Tappin, D.; Bentley, T. Working from home before, during and after the Covid-19 pandemic: Implications for workers and organisations. N. Z. J. Employ. Relations 2020, 45, 5–16. [Google Scholar] [CrossRef]
  3. Mandal, S.; Khan, D.A.; Jain, S. Cloud-based zero trust access control policy: An approach to support work-from-home driven by COVID-19 pandemic. New Gener. Comput. 2021, 39, 599–622. [Google Scholar] [CrossRef] [PubMed]
  4. Kindervag, J.; Balaouras, S. No more chewy centers: Introducing the zero trust model of information security. Forrester Res. 2010, 3. [Google Scholar]
  5. Rose, S.; Borchert, O.; Mitchell, S.; Connelly, S. Zero Trust Architecture; Technical Report; National Institute of Standards and Technology: Washington, DC, USA, 2020.
  6. Mehraj, S.; Banday, M.T. Establishing a zero trust strategy in cloud computing environment. In Proceedings of the 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 22–24 January 2020; pp. 1–6. [Google Scholar]
  7. Department of Defense Chief Information Officer. Department of Defense Zero Trust Strategy. 2020. Available online: https://dodcio.defense.gov/Portals/0/Documents/Library/DoD-ZTStrategy.pdf (accessed on 2 December 2022).
  8. Patil, A.P.; Karkal, G.; Wadhwa, J.; Sawood, M.; Reddy, K.D. Design and implementation of a consensus algorithm to build zero trust model. In Proceedings of the 2020 IEEE 17th India Council International Conference (INDICON), New Delhi, India, 10–13 December 2020; pp. 1–5. [Google Scholar]
  9. Uehara, M. Zero Trust Security in the Mist Architecture. In Proceedings of the Complex, Intelligent and Software Intensive Systems: Proceedings of the 15th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS-2021), Asan, Republic of Korea, 1–3 July 2021; Springer: Cham, Switzerland, 2021; pp. 185–194. [Google Scholar]
  10. Cybersecurity Framework. Available online: https://www.nist.gov/cyberframework/updating-nist-cybersecurity-framework-journey-csf-20 (accessed on 6 December 2022).
  11. Kerman, A. Zero Trust Cybersecurity: ‘Never Trust, Always Verify’. NIST Blog, 2020. Available online: https://www.nist.gov/blogs/taking-measure/zero-trust-cybersecurity-never-trust-always-verify (accessed on 6 December 2022).
  12. Dimitrakos, T.; Dilshener, T.; Kravtsov, A.; La Marra, A.; Martinelli, F.; Rizos, A.; Rosetti, A.; Saracino, A. Trust aware continuous authorization for zero trust in consumer internet of things. In Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Guangzhou, China, 29 December 2020–1 January 2021; pp. 1801–1812. [Google Scholar]
  13. What Is a Zero Trust Architecture—Paloaltonetworks.com. Available online: https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-architecture (accessed on 6 December 2022).
  14. Staff, I.T. Implementing a Zero Trust Security Model at Microsoft-Inside Track Blog—Microsoft.com. Available online: https://www.microsoft.com/insidetrack/blog/implementing-a-zero-trust-security-model-at-microsoft/ (accessed on 6 December 2022).
  15. Conway, A. New Data from Microsoft Shows How the Pandemic Is Accelerating the Digital Transformation of Cyber-Security—Microsoft Security Blog—microsoft.com. Available online: https://www.microsoft.com/en-us/security/blog/2020/08/19/microsoft-shows-pandemic-accelerating-transformation-cyber-security/ (accessed on 6 December 2022).
  16. Brenduns. Configure Microsoft Defender for Endpoint in Microsoft Intune—Learn.microsoft.com. Available online: https://learn.microsoft.com/en-us/mem/intune/protect/advanced-threat-protection-configure (accessed on 6 December 2022).
  17. Siosulli. Microsoft Secure Score—Learn.microsoft.com. Available online: https://learn.microsoft.com/en-us/microsoft-365/security/defender/microsoft-secure-score?view=o365-worldwide (accessed on 6 December 2022).
  18. Katzer, M.; Katzer, M. Microsoft Secure Score. In Securing Office 365: Masterminding MDM and Compliance in the Cloud; Apress: California, MA, USA, 2018; pp. 97–156. [Google Scholar]
  19. Samaniego, M.; Deters, R. Zero-Trust Hierarchical Management in IoT. In Proceedings of the 2018 IEEE International Congress on Internet of Things (ICIOT), San Francisco, CA, USA, 2–7 July 2018; pp. 88–95. [Google Scholar] [CrossRef]
  20. Scarfone, K.; Mell, P. The Common Configuration Scoring System (CCSS): Metrics for Software Security Configuration Vulnerabilities; NIST Interagency Report; NIST: Gaithersburg, MD, USA, 2010.
  21. Kasprzyk, R.; Stachurski, A. A concept of standard-based vulnerability management automation for IT systems. Comput. Sci. Math. Model. 2016, 3, 33–38. [Google Scholar] [CrossRef]
  22. Torkura, K.A.; Sukmana, M.I.; Meinig, M.; Kayem, A.V.; Cheng, F.; Graupner, H.; Meinel, C. Securing cloud storage brokerage systems through threat models. In Proceedings of the 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA), Krakow, Poland, 16–18 May 2018; pp. 759–768. [Google Scholar]
  23. Wicaksana, A.; Wira, J.C. Security Analysis of Private Blockchain Implementation for Digital Diploma. Int. J. Innov. Comput. Inf. Control 2022, 18, 1601–1615. [Google Scholar]
  24. Yu, X.; Shu, Z.; Li, Q.; Huang, J. BC-BLPM: A multi-level security access control model based on blockchain technology. China Commun. 2021, 18, 110–135. [Google Scholar] [CrossRef]
  25. Albuali, A.; Mengistu, T.; Che, D. ZTIMM: A zero-trust-based identity management model for volunteer cloud computing. In Proceedings of the Cloud Computing–CLOUD 2020: 13th International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, 18–20 September 2020; Springer: Cham, Switzerland, 2020; pp. 287–294. [Google Scholar]
  26. Ge, Y.; Zhu, Q. Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks. In Proceedings of the 2022 IEEE Conference on Communications and Network Security (CNS), Austin, TX, USA, 3–5 October 2022; pp. 359–364. [Google Scholar]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.