Cloud 101CircleEventsBlog
Master CSA’s Security, Trust, Assurance, and Risk program—download the STAR Prep Kit for essential tools to enhance your assurance!

Download Publication

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Who it's for:
  • Cybersecurity professionals
  • Software developers
  • Decision-makers
  • IT auditors
  • Network security engineers

Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives

Release Date: 11/05/2024

This publication explores the use of asymmetric cryptography in Zero Trust. Asymmetric cryptography provides an industry-standard, secure method to establish identity, authenticate entities, maintain data integrity, and control access without requiring any explicit trust. Therefore, it aligns well with the core principles of Zero Trust: Never Trust, Always Verify and Least Privilege.

When considering Zero Trust, asymmetric cryptography is particularly useful for authentication and data protection. For authentication, asymmetric cryptography is integral to Public-Key Infrastructure (PKI), utilizing digital signatures to authenticate users and devices. For data protection, asymmetric cryptography is integral in key exchange to establish the symmetric key for data encryption. 

When implementing asymmetric cryptography, it's important to consider factors such as security strength, computational cost, and key size. Additionally, robust key management practices, encompassing generation, distribution, storage, and revocation, are crucial for maintaining cryptographic integrity. Moreover, seamless integration with Identity and Access Management (IAM) systems is essential for efficient authentication and authorization processes.
 
Readers will come to understand how asymmetric cryptography is a powerful enabler for Zero Trust. Its ability to establish secure communications, verify identities, and ensure data protection, clearly supports Zero Trust objectives. 

Key Takeaways:
  • The role of asymmetric cryptography in Zero Trust
  • The role of key management in cryptography
  • Methods for effective key management, including key generation, distribution, storage, rotation, revocation, and hardware security modules (HSMs)
  • How to use asymmetric cryptography in various scenarios, including authentication methods like SSH keys, OAuth2.0, and Kerberos
  • Computational overheads and risks associated with asymmetric cryptography
  • Zero Trust principles relevant to asymmetric cryptography
Download this Resource

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Zero Trust Guidance for Critical Infrastructure
Zero Trust Guidance for Critical Infrastructure
The Lost Art of Visibility, in the World of Clouds
The Lost Art of Visibility, in the World of Clouds
Published: 11/20/2024
CSA Community Spotlight: Addressing Emerging Security Challenges with CISO Pete Chronis
CSA Community Spotlight: Addressing Emerging Security Challenges wi...
Published: 11/18/2024
Group-Based Permissions and IGA Shortcomings in the Cloud
Group-Based Permissions and IGA Shortcomings in the Cloud
Published: 11/18/2024
9 Tips to Simplify and Improve Unstructured Data Security
9 Tips to Simplify and Improve Unstructured Data Security
Published: 11/18/2024

Acknowledgements

Ryan Gifford
Ryan Gifford
Research Analyst, CSA

Ryan Gifford

Research Analyst, CSA

Shruti Kulkarni
Shruti Kulkarni
Information Security Architect, Elexon

Shruti Kulkarni

Information Security Architect, Elexon

I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Heinrich Smit
Heinrich Smit
CISO & Risk Management at Semperis

Heinrich Smit

CISO & Risk Management at Semperis

Heinrich is a recognized Information Protection and Zero Trust expert who started out in Law, and pivoted to his love of technology during the Tech Boom. He has led teams at software innovators and large financial institutions, has authored entire Information Security Policy stores, and has protected data at both 280,000 seat regulated enterprises and SAAS-based startup unicorns. He is passionate about Privacy and Zero Trust, as well as Def...

Read more

Hani Raouda
Hani Raouda
Cybersecurity Professional at Google

Hani Raouda

Cybersecurity Professional at Google

Paul Simmonds
Paul Simmonds
CEO at Global Identity Foundation & Board Member of CSA UK Chapter

Paul Simmonds

CEO at Global Identity Foundation & Board Member of CSA UK Chapter

Paul is the CEO of the Global Identity Foundation and formerly the global CISO of AstraZeneca, ICI and prior to that Motorola Cellular Infrastructure. He is twice listed as one of Network World’s “most powerful people in networking”. He is a director of the Cloud Security Alliance (Europe), co-founded the Jericho Forum, and sits on the advisory boards of a number of global tech companies.

Read more

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA

Erik Johnson

Cloud Security Specialist & Senior Research Analyst, CSA

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training