Endpoint Device Risk-Scoring Algorithm Proposal for Zero Trust

: The rapid expansion of remote work following the COVID-19 pandemic has necessitated the development of more robust and secure endpoint device security solutions. Companies have begun to adopt the zero trust security concept as an alternative to traditional network boundary security measures, which requires that every device and user be considered untrustworthy until proven otherwise. Despite the potential beneﬁts of implementing zero trust, the stringent security measures can inadvertently lead to low availability by denying access to legitimate users or limiting their ability to access necessary resources. To address this challenge, we propose a risk-scoring algorithm that balances conﬁdentiality and availability by evaluating the user’s impact on resources. Our contributions include (1) summarizing the limitations of existing risk scoring systems in companies that implement zero trust, (2) proposing a dynamic importance metric that measures the importance of resources accessible to users within zero trust systems, and (3) introducing a risk-scoring algorithm that employs the dynamic importance metric to enhance both security and availability in zero trust environments. By incorporating the dynamic importance metric, our proposed algorithm provides a more accurate representation of risk, leading to better security decisions and improved resource availability for legitimate users. This proposal aims to help organizations achieve a more balanced approach to endpoint device security, addressing the unique challenges posed by the increasing prevalence of remote work.


Introduction
Remote work has expanded in many companies following the COVID-19 pandemic.Traditionally, the network boundary security concept has been used to maintain security for remote work.The network boundary security concept separates internal and external networks and restricts access at the network boundary.In this concept, remote access to internal networks is assumed to be access that can be trusted.However, as remote work increases, the limitations of boundary security are emerging owing to vulnerabilities in remote solutions and the large variety of access devices [1][2][3].Before the expansion of remote work, access to company networks was possible on a limited number of devices that had previously been provided and inspected by the companies.However, as remote work expands, employees can use personal devices to access company data from outside company networks.The conventional boundary security concept has limitations in that it is difficult to control access from vulnerable or already infected devices when internal networks are accessed.As the limitations of boundary security became apparent, there was a need for new security methods to compensate for these limitations and allow for secure remote work.Consequently, the zero trust concept was proposed as a new security paradigm that improves upon boundary security.Zero trust is a security concept in which no activity is trusted, and verification must be performed constantly [4][5][6].Contrary to the conventional boundary security approach, when zero trust is implemented, risk scoring is performed to verify all devices each time a resource access request is made, and access authorization is determined according to the results of the scoring [5,7,8].
The advantage of zero trust is that it ensures the security and safety of company resources by not trusting and constantly performing risk scoring according to the same criteria when access requests arrive [9,10].However, when risk scoring is performed according to the same criteria for all users, resources become more secure, but there is a disadvantage in that the resources may become less available.Availability refers to the degree to which a permitted user can access requested resources promptly.Decreased availability implies that it takes a considerable time or it is difficult to access resources when a user makes a request for access.For example, consider a shopping mall that has implemented zero trust where access requests are made by employees who are allowed to read customer information as well as interns who have low-level permissions.In this case, if risk scoring is performed according to the same high-level criteria that are used for employees with high-level permissions, interns with low-level permissions will only be allowed access after going through high-level security procedures.As such, it may be difficult to follow the security procedures, and accessing resources may become inconvenient, thus decreasing availability.Conversely, if risk scoring is performed according to the same low-level criteria, it can decrease confidentiality and even lead to security incidents if the standard for employee devices that can access customers' personal information is lowered and important resources are accessed.Consequently, a risk-scoring algorithm that inspects all users with the same criteria is inefficient in terms of system security and availability.
To increase the confidentiality and availability of systems that implement zero trust, in this study, we propose (1) a "dynamic importance metric" for evaluating importance according to the user's role and resource access permissions and (2) a risk-scoring algorithm based on the Common Configuration Score System (CCSS) base metric, which dynamically changes its security demands according to importance as evaluated by the dynamic importance metric.CCSS is a standard framework that assigns scores to the security vulnerabilities of equipment in IT systems and checks them.
The contributions of this study are as follows.I. Summarize and describe the limitations of the risk-scoring system that is used in companies that currently implement zero trust.
II. Propose a dynamic importance metric that can measure the importance of resources that are accessible to users within systems that implement zero trust.
III. Propose a risk-scoring algorithm that uses the dynamic importance metric to efficiently increase security and availability for users who are accessing resources in systems that implement zero trust.
The remainder of this paper is organized as follows.Section 2 describes the necessity of risk scoring in systems that implement zero trust as well as trends in risk scoring.In addition, it describes CCSS, which is a framework that evaluates vulnerabilities in devices' system settings.Section 3 presents the proposed dynamic importance metric for evaluating importance according to users' roles and resource access permissions and the zero trustbased risk-scoring approach for user devices that employs the dynamic importance metric.Section 4 presents conclusions and future research directions.

Trust Algorithm in Zero Trust
Zero trust is a security concept in which requests for access to resources are not trusted but continuously verified.Figure 1 shows the zero trust access.The core of zero trust comprise the (1) policy decision point (PDP) and (2) policy enforcement point (PEP).The PDP determines the policy set by the company regarding whether resource access is allowed, and the PEP allows or disallows all access according to the policy.In particular, users who request access to resources in a system that implements zero trust are allowed to access the resources after receiving verification via the PDP and PEP [5,7,9].The PDP is similar to the brain of zero trust.Within the PDP, the trust algorithm is used to ultimately determine whether users' resource access requests will be granted according to the policies set by the company.The trust algorithm is a planned process that is used to determine whether access to a resource is allowed.Figure 2 shows the trust algorithm considers the following sources: (1) access request, (2) subject database and history, (3) asset database, (4) resource policy requirements, and (5) threat intelligence and logs [5,11].Figure 3 below illustrates the relationship between the trust algorithm and risk scoring in a zero trust.In the case of access requests, which are one of the trust algorithm's sources, user information is verified in regard to requests to access resources.During verification, risk scoring is performed on the user device.Risk scoring refers to assigning scores regarding whether the user's device has an adequate level of security.Each time a user requests access to a resource, the user is subjected to risk scoring [5,11,12].In a company that implements zero trust, the scoring criteria for risk scoring are established by the trust algorithm's policies, and access is only allowed if the user device's risk score meets a certain standard.For example, if there is an e-commerce business, such as a mall that has implemented zero trust within the company, devices are inspected using the same risk scoring standard for all users to provide access to resources.If an employee named Alice accesses a company resource to perform remote work, she is subjected to a device inspection according to the risk-scoring algorithm.After inspection, access is allowed if it is judged that the risk score of Alice's device is safe according to the policies established by the mall.
When creating a trust algorithm's policies, it is necessary to consider the balance between security and availability [5].For example, if a policy is created in which resources can only be accessed when all users receive a good risk score, users who intend to access the resource may be inconvenienced because access is limited to a high-level security configuration.Such a policy increases resource security but reduces availability.In contrast, if a policy is created in which all users who request access to a resource are allowed despite receiving poor risk scores, availability is increased but security is reduced because vulnerable devices can access the resource [13].

Device Risk Scoring Trends and Common Configuration Scoring System
The trust algorithm determines whether access is allowed by comparing the access request in the input with asset database information when examining the device's security level.At this time, it is necessary to perform risk scoring on the device to make an efficient determination.Systems that use zero trust should continuously protect systems and users through risk scoring and allow appropriate access.Most companies implement zero trust perform risk scoring, which can examine the security levels of device devices.To perform risk scoring, it is necessary to analyze security configurations and establish objective evaluation standards.To establish objective evaluation standards, one may use a risk-scoring standard framework, such as the CCSS, which evaluates vulnerabilities in device system settings.This section first describes risk-scoring trends in companies that have implemented zero trust.Next, it introduces CCSS, which is a typical risk scoring standard framework.

Corporate Trends
When Microsoft establishes zero trust within a company, the client's devices and IDs are registered and managed in Microsoft Intune [14,15].Microsoft Intune is a Microsoft management tool that provides corporate and bring-your-own-device (BYOD) integrated endpoint device management.Here, Microsoft Secure Score performs risk scoring on devices that request access by linking with Intune's policies and Microsoft Defender, which is a product that manages device health checks.Microsoft Secure Score represents the device's security state as a number based on the system configuration, user actions, and other security-related measurements.Based on the results, resource access is determined via threat level classifications [16].
The Secure Score that is provided by Microsoft makes the inspection results visible and provides a variety of inspection items.It is used to effectively inspect the security levels of device devices in a system that implements zero trust and to suggest recommended security actions [17,18].However, Microsoft's Secure Score does not perform scoring based on importance according to the user's role or resource access permissions.For example, the default value of the perfect score (e.g., 9 points) can be set for "Ensure all users can complete multi-factor authentication for secure access", which is one of the Secure Score inspection items; however, dynamic inspections as not performed for each user.Therefore, all devices in an organization are inspected according to the same standard.
Cisco is another company that implements zero trust and performs vulnerability scoring.Contrary to Microsoft, which scores user devices, Cisco creates scores for the vulnerabilities of its own products.Cisco has its own scoring system for examining systems to implement zero trust.However, like Microsoft, Cisco does not provide scoring based on importance according to the users' roles and access permissions; instead, it performs scoring with standardized scores [19].
As such, the companies that are leading the way in introducing zero trust perform risk scoring on endpoints using their own solutions and determine whether a resource can be accessed based on the results.In addition, intensive research and solution development are being conducted on how to perform risk scoring on user devices.
Those companies provide Secure Score services that can examine their own services and products.However, these companies score all user devices according to the same standard.They are disadvantageous because they do not use a scoring algorithm that considers the roles and resources access permissions of users in the system.

Common Configuration Scoring System
To use device risk scoring in their security systems, companies can use their own algorithms or consider the use of a standard scoring framework for device security configurations, such as the CCSS.CCSS is a risk-scoring framework through which analysts can use three types of metrics (base, temporal, and environmental) to evaluate the vulnerabilities of IT system security configurations [20].The base metrics measure vulnerabilities in devices' basic configurations.Temporal metrics measure the expected rate of reduction in threats due to the attack cycle and supplementary measures.Environmental metrics measure values regarding the environment that is used to calculate the base metrics and temporal metrics.Here, the term "environment" refers to aspects such as the IT system's facilities.When the CCSS framework is used, the base metrics must be used.The other metrics can be used optionally, but there are constraints on applying them to complex corporate-level system architectures.Therefore, this section only discusses the base metrics [20][21][22].

CCSS Base Metrics and Base Score
The base metrics are used to evaluate vulnerabilities based on the fundamental properties of security configuration vulnerabilities, and the base score uses this evaluation to show the vulnerabilities' degree of severity.Figure 4 shows the base metrics of CCSS.In the base metrics, a vulnerability's degree of severity considers the exploitability of the security configuration and impact.The metrics that indicate exploitability are access vector (AV), authentication (Au), and access complexity (AC), and the metrics that indicate impact are confidentiality impact (C), integrity impact (I), and availability impact (A).The exploitation method (EM) indicates whether the vulnerability exploitation method is active or passive, and it is not used directly in scoring but is used to ameliorate configuration vulnerabilities [20].
The access vector is a metric value that depends on the attacker's location, and it can be network, adjacent network, or local.Authentication is the number of times an attacker needs to be authenticated before maliciously using the configuration, and it can be none, single, or multiple.Access complexity indicates the degree to which the attacker must make prior preparations, and it can be high, medium, or low.For example, consider a case in which an attacker performs an attack after acquiring permissions through a malicious email file.The Access complexity can be found based on the permissions that must be acquired beforehand.For administrator permissions, the access complexity is set to high; for user permissions; it is set to medium; otherwise, it is set to low.The confidentiality impact, integrity impact, and availability impact can be complete, partial, or none according to the degree of impact on the system's confidentiality, integrity, and availability (CIA Triad).Here, the results of measuring each metric are referred to as vectors.Algorithm 1 shows the equation for calculating the CCSS base score [20].The base score indicates the security configuration's vulnerability using the following base equation and the metric values of the base metrics.The values of the metrics are inserted in place of constants that are proportional to the vulnerabilities to find the values of the impact, exploitability, and f(impact) variables.Ultimately, a base score from 0 to 10 is produced [20,23,24].
Below is the process for finding the CCSS base score for "automatic login is set up" on a PC.(1) AV is local because it can be physically accessed.(2) AU is none because there is no need for additional authentication.(3) AC is low because there is no need to do extra work to find the password because automatic login is set up.In this case, the confidentiality impact, integrity impact, and availability impact values can be assessed as partial.At this point, the values of the vectors and CCSS base score can be expressed as follows: "AV:L/AC:L/Au:N/C:P/I:P/A:I", Base Score: 4.6.

Proposed User Device Risk Scoring for Zero Trust Access
In this section, we propose (1) a dynamic importance metric that measures the dynamic importance effect that occurs during security events according to the users' roles and resource access permissions and (2) a risk-scoring algorithm that uses the dynamic importance metric.(1) The dynamic importance metric measures the importance of the resources that can be accessed by the user in the system.( 2) The risk-scoring algorithm that uses the dynamic importance metric can perform scoring using different criteria for each user.This risk-scoring algorithm can perform risk scoring using stricter criteria for users who have important permissions and less strict criteria for users without important permissions.Ultimately, it can efficiently increase confidentiality and availability for users who access resources in the system.The dynamic importance metric comprises two elements: accessible resource and resource importance.These two importance-based elements are applied as weights to the values of the evaluations of user device configurations when users access resources.
Next, we propose a risk-scoring algorithm that adds the dynamic importance metric.The risk-scoring algorithm with the additional dynamic importance metric is based on the CCSS base score and adds role-based access control (RBAC) concepts, such as user company position permissions and departments.A risk-scoring approach that reflects users' resource access levels can aid in efficient corporate zero trust implementations.In zero trust, the users and systems that request access to resources must pass through strict user authentication and device risk-scoring.In short, resources cannot be accessed if an entity cannot be trusted.Thereby, performing risk scoring on all users who attempt to access resources is an important factor for companies that implement zero trust.However, these companies perform risk scoring with the same criteria rather than using different criteria for each user even though there are various users with various permissions and goals.In addition, relevant studies have not been conducted.Therefore, for companies that want to implement zero trust, in this study, we propose a user device risk-scoring algorithm that also reflects the importance of the resources that can be accessed.

Dynamic Importance Metric
This section describes the dynamic importance metric, which can measure the dynamic importance effect that occurs during security incidents according to the users' roles and resource access permissions.Figure 5 shows the overview of the dynamic importance metric.As shown in the figure, the dynamic importance metric comprises (1) accessible resource (AR), which measures the permissions that the user needs to access resources, and (2) resource importance (RI), which measures the importance of the resources.The new dynamic importance metric is used in the proposed risk-scoring algorithm in addition to the CCSS base metrics.(1) Accessible resource shows the permissions needed to access resources.For example, there is a clear difference in the permissions needed by a company employee and a department manager to access company resources.Therefore, accessible resource refers to the extent of the company resource permissions that are granted by workers' ranks, such as intern, manager, director, and president.
(2) Resource importance indicates the importance of company resources.For a resource that is subject to a user access request, resource importance indicates the effect that an attack on that resource would have on availability, confidentiality, and integrity.For example, suppose that an employee is a member of the human resources department.In this case, the employee can access human resources information.If the employee were a member of the security department, they could access the company security systems' resources.Here, resource importance measures the effect of attacking each resource, and it evaluates the importance of the resources that can be accessed by the employees.Therefore, the dynamic importance metric, which comprises two elements, performs the role of assigning weight values to the confidentiality impact, integrity impact, and availability impact according to the extent of the permissions assigned to company resources according to the users' ranks and departments.

Dynamic Importance Metric Vector Diagram
This section explains the dynamic importance value generation flow chart.In Figures 6  and 7, the dynamic importance metric vectors are added to the CCSS scores and used in the risk-scoring algorithm.Accessible resource and resource importance, which are elements of the dynamic importance metric, are evaluated according to the effect that user permissions have on CIA.For accessible resource, the metric's value is set as none, partial, or complete by comprehensively considering whether the user can access confidential or important resources or has permission to add, modify, or delete resources.One method for applying dynamic importance vectors to company employee device scoring is to generate vector values by differentiating users' responsibilities and their position of office.For example, it is assumed that vulnerabilities in the security configurations of IT development team members will expose development source code or the structures of In the two examples, a value of "AR:N/RI:C/" is calculated for the intern, and a value of "AR:C/RI:C/" is calculated for the manager.Here, when the proposed risk scoring equation was used to calculate the dynamic importance metrics, the intern's value was 3.3 points, and the manager's value was 4.6 points.As a second example, the CCSS base score for "USB AutoRun" is calculated as follows.AV is local because the USB must be physically inserted.AU is none, and the AC is low because the USB automatically runs.In this case, there is an overall complete impact on the CIA of the user PC.Therefore, the CCSS vector is "AV:L/Au:N/AC:L/C:C/I:C/A:C", and the base score is fairly high at 7.2 points.Here, the method for using the dynamic importance metric is explained using the two groups (1) AR:C/IR:C and (2) AR:C/IR:C as examples.AR evaluates the confidentiality, availability, and integrity of resources according to the permissions granted to the employee's position in the company.It is divided into none, partial, and complete by considering access permissions for important documents.RI evaluates confidentiality, availability, and integrity according to the resources requested by the department, and it is divided into none, partial, and complete.An instance of a resource could be data that is public even to users with low-level permissions, or it could be confidential data that contains important internal company information.As such, various vectors from AR:C/RI:C to AR:N/RI:N could be used as the CCSS vector for "USB Autorun" according to the company resource.
#1 AR:C/IR:C: The user requests important confidential data within the company, and they have high-level resource permissions.
#2 AR:N/RI:N: The user requests data that is public to even users with low-level permissions, and the user has low-level resource permissions.
In case #1, a score of 7.2 points is found when the dynamic-importance-metric-based risk-scoring algorithm is applied because the vector is AR:C/IR:C.In case #2, a score of 3.8 points is found when the dynamic-importance-metric-based risk-scoring algorithm is applied because the vector is AR:N/RI:N.In the case of AR:C/IR:C, the CCSS base score is not affected by the dynamic importance metric, and a score of 7.2 points is produced.This is because in the case of AR:C/IR:C, important confidential data is accessed, and the user has high-level permissions; therefore, there is no need to relax the criteria for risk scoring.Conversely, in the case of AR:N/RI:N, a user with low-level permissions is requesting access to data that can easily be accessed by users with low-level permissions; therefore, relaxed criteria are applied, giving consideration to availability.The table below shows examples of applying the risk-scoring algorithm to typical security configurations for two groups, (1) AR:C/IR:C and (2) AR:N/RI:N.

Conclusions
As the number of companies implementing remote work is increasing, many employees are using personal devices to access company data from outside of company networks.Accordingly, there is a need for new security methods that can overcome the limitations of existing boundary security to allow for safe remote work.A new security paradigm

Figure 3 .
Figure 3. Risk Scoring in Zero Trust.

Figure 5 .
Figure 5. Overview of Dynamic Importance Metric with Base Metrics.

Table 1 .
Example table of risk-scoring algorithm.