A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls
Abstract
:1. Introduction
1.1. Background
1.2. Contribution
1.3. Structure of This Paper
2. Related Works and Their Analysis
2.1. Multi-Level Security
2.2. Zero Trust and Its Architecture
3. Introduction of MLS Classification Criteria and Proposed Zero-Trust-Based MLS Model
3.1. Multi-Level Security Classification Criteria in the Republic of Korea
3.2. Proposed Zero-Trust-Based MLS Model
- -
- When an external subject accesses C-level resources (Orange line): C-level resources represent the highest level of data or systems, such as national secrets, requiring security equivalent to the traditional network segregation framework. Therefore, external users who are not located within the same network as the C-level data or systems can only transmit data via network bridging solutions within the network segregation system.
- -
- When an internal subject accesses C-level resources (Green line): This type of subject resides within the same network as the C-level resources and refers to users or systems authorised to access C-level data or information systems. Since they are located within the same network as the C-level resources, there is no need for network bridging solutions during communication. However, access to the resources is granted only after validation by the PDP and PEP, in accordance with Zero Trust principles.
- -
- When a subject accesses S- and O-level resources, regardless of being internal or external (Blue line): This type involves access to resources other than C-level resources (i.e., S- and O-level resources). Access is dynamically controlled by the PDP and PEP based on the subject’s identity and authorisation, as well as the state of the resource being accessed.
3.3. Risk Analysis of Proposed Zero-Trust-Based MLS Model
3.4. Key Components in the Proposed Zero-Trust-Based MLS Model
3.5. Comparison Analysis Between Proposed Zero-Trust-Based MLS Model with Other Models
4. Proposed Security Controls for the Zero-Trust-Based MLS Model and Its Robustness
4.1. Security Controls
- -
- Administrative controls: Security controls that manage security through policies, procedures, guidelines, and employee training.
- -
- Technical controls: Security controls that utilise technical means, such as security solutions or equipment, to protect the organisation’s information assets.
- -
- Physical controls: Security controls aimed at protecting the organisation’s facilities or infrastructure from physical threats.
4.2. Robustness of Proposed Model Based on Attack Scenarios
- Attack Scenario 1A practical case related to Attack Scenario 1 is linked to North Korea’s Andariel hacking group. Starting in October 2022, they launched attacks targeting the Republic of Korea’s defence companies and contractors by stealing user credentials, infecting systems with malware, and exfiltrating data. Figure 6 illustrates the attack scenario and it involves an attacker compromising the credentials and device of an authorised user to install malware on the organisation’s internal systems and exfiltrate Sensitive data, which is C-level data.
- -
- If the attacker uses the credentials of an authorised user with legitimate access to the organisational network, MFA (Multi-Factor Authentication) requires additional authentication. Furthermore, under the Zero Trust model, the access attempt would be detected as anomalous behaviour, since it is not originating from the user’s usual device, enabling the system to defend against the attack (AC-1, AC-2, AC-8, AC-9, CA-1, IA-2).
- -
- If the attacker uses the authorised user’s device to access the organisational network, MFA would demand additional authentication, such as biometric verification, providing strong authentication measures to defend against the attack (AC-1, AC-2, AC-9, IA-2).
- -
- If malware is installed on critical systems after gaining access to the organisation’s internal network, the Zero Trust principle prevents lateral movement, and the principle of least privilege ensures that unauthorised users cannot execute or modify data or files. This effectively prevents the propagation and installation of malware (AC-1, AC-2, AC-3, AC-5, AC-12, CA-1).
- -
- Regarding the threat of Sensitive data exfiltration, security controls to detect and block anomalous traffic are applied, along with data encryption, providing robust protection against data leakage (AC-2, AC-3, AC-5, CA-1, SC-2, SC-8).
- Attack Scenario 2A practical case for Attack Scenario 2 involves North Korea’s Lazarus hacking group. Starting in November 2022, the group exploited vulnerabilities in network bridging systems to infiltrate internal networks and exfiltrate data from the Republic of Korea’s defence companies and contractors. Figure 7 shows the attack from the North Korea’s Lazarus hacking group and this scenario describes an attacker attempting to access a network-segregated environment to install malware on systems and exfiltrate Classified data, which is C-level data.
- -
- The attacker targets organisational systems connected to the external network, which interfaces with the network bridging system, and attempts to infiltrate and distribute malware. However, as the organisation’s systems adhere to the Zero Trust model, they employ diverse and robust authentication mechanisms and security controls against malware, effectively defending against the attack (AC-1, AC-2, AC-3, SI-2).
- -
- If the attacker scans open ports used for testing purposes and attempts to infiltrate the internal network through the port, the organisation’s security controls, such as those segregating the test environment and detecting anomalous traffic, enable defence against such attempts (CM-2, RA-2, SI-1, SC-6, SC-10, CA-1).
- -
- Even if the attacker exploits vulnerabilities in the network bridging system to gain access to the internal network, the security controls applied within the network-segregated environment and the Zero Trust principles prevent lateral movement. Continuous validation of the permissions of subjects and objects further defends against attempts to collect critical organisational data (AC-1, AC-2, AC-3, AC-12, CA-1, SC-2, SI-3).
- -
- Regarding the threat of classified data exfiltration, controls to detect and block anomalous traffic, as well as data encryption, ensure the prevention of data leaks (AC-2, AC-3, AC-5, CA-1, SC-2, SC-8).
5. Conclusions
5.1. Research Summary
5.2. Future Works
- -
- Enhancing Dynamic Access Control: Developing advanced real-time trust-based dynamic authentication and continuous access validation mechanisms for users and organisational information assets. This ensures both security and data usability while adapting to evolving threats.
- -
- Leveraging Artificial Intelligence and Machine Learning: Supporting automated policy management to create, update, and enforce security policies dynamically. This approach not only improves threat detection and response times, but also aligns with emerging technology trends.
- -
- Strengthening Compatibility with International Standards: Aligning with global standards, such as those from NIST, ITU, and 3GPP, to ensure broader applicability across various industries while enhancing compliance with legal regulations and security frameworks.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Mehraj, S.; Banday, M.T. Establishing a zero trust strategy in cloud computing environment. In Proceedings of the 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, 22–24 January 2020; pp. 1–6. [Google Scholar]
- Malatji, M.; Tolah, A. Artificial intelligence (AI) cybersecurity dimensions: A comprehensive framework for understanding adversarial and offensive AI. AI Ethics 2024, 1–28. [Google Scholar] [CrossRef]
- National Information Society Agency (NIA). Public Data Sovereignty Cloud Application Direction for Super-Large AI Utilization in the Public Sector; National Information Society Agency (NIA): Daegu, Republic of Korea, 2024.
- Han, B.Y.; Choi, Y.K.; So, G.Y.; Shin, Y.T. A Study on Operation for DevOps Using Zero Trust in Network Separation Environment. Converg. Secur. J. 2024, 24, 27–34. [Google Scholar]
- Rane, J.; Kaya Ömer Mallick, S.K.; Rane, N.L. Influence of digitalization on business and management: A review on artificial intelligence, blockchain, big data analytics, cloud computing, and internet of things. In Generative Artificial Intelligence in Agriculture, Education, and Business; Deep Science Publishing: Yakutiye, Turkey, 2024; pp. 1–26. [Google Scholar] [CrossRef]
- Yin, H.L.; Fu, Y.; Li, C.L.; Weng, C.X.; Li, B.H.; Gu, J.; Lu, Y.S.; Huang, S.; Chen, Z.B. Experimental quantum secure network with digital signatures and encryption. Natl. Sci. Rev. 2023, 10, nwac228. [Google Scholar] [CrossRef] [PubMed]
- Cao, X.-Y.; Li, B.-H.; Wang, Y.; Fu, Y.; Yin, H.-L.; Chen, Z.-B. Experimental quantum e-commerce. Sci. Adv. 2024, 10, eadk3258. [Google Scholar] [CrossRef] [PubMed]
- Gill, S.S.; Wu, H.; Patros, P.; Ottaviani, C.; Arora, P.; Pujol, V.C.; Haunschild, D.; Parlikad, A.K.; Cetinkaya, O.; Lutfiyya, H.; et al. Modern computing: Vision and challenges. Telemat. Inform. Rep. 2024, 13, 100116. [Google Scholar] [CrossRef]
- Naidoo, R. A multi-level influence model of COVID-19 themed cybercrime. Eur. J. Inf. Syst. 2020, 29, 306–321. [Google Scholar] [CrossRef]
- United States Congress. Federal Information Security Management Act of 2002 (FISMA), 44 U.S.C. § 3541-3549. 2002. Available online: https://www.govinfo.gov (accessed on 20 November 2024).
- European Union. General Data Protection Regulation (GDPR), Article 9: Processing of Special Categories of Personal Data. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679 (accessed on 21 September 2024).
- European Union. General Data Protection Regulation (GDPR), Article 32: Security of Processing. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32016R0679 (accessed on 21 September 2024).
- Obi, O.C.; Akagha, O.V.; Dawodu, S.O.; Anyanwu, A.C.; Onwusinkwue, S.; Ahmad, I.A.I. Comprehensive review on cybersecurity: Modern threats and advanced defense strategies. Comput. Sci. IT Res. J. 2024, 5, 293–310. [Google Scholar]
- National Intelligence Service (NIS). National Intelligence Service Announces Major Cybersecurity Policy Directions in “CSK 2024”. Available online: https://www.nis.go.kr/CM/1_4/view.do?seq=315 (accessed on 2 September 2024).
- Stafford, V. Zero Trust Architecture; NIST Special Publication 800-207; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020. Available online: https://nvlpubs.nist.gov/nistpubs/specialpublications/NIST.SP.800-207.pdf (accessed on 2 September 2024).
- Jabar, T.; Mahinderjit Singh, M. Exploration of mobile device behavior for mitigating advanced persistent threats (APT): A systematic literature review and conceptual framework. Sensors 2022, 22, 4662. [Google Scholar] [CrossRef] [PubMed]
- Singh, S.; Sharma, P.K.; Moon, S.Y.; Moon, D.; Park, J.H. A comprehensive study on APT attacks and countermeasures for future networks and communications: Challenges and solutions. J. Supercomput. 2019, 75, 4543–4574. [Google Scholar] [CrossRef]
- Force, J.T. Security and Privacy Controls for Information Systems and Organizations; NIST Special Publication 800-53 Revision 5; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2017. Available online: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf (accessed on 12 September 2024).
- National Institute of Standards and Technology (NIST). Standards for Security Categorization of Federal Information and Information Systems (FIPS 199); Federal Information Processing Standards Publication 199; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2004. Available online: https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.199.pdf (accessed on 18 September 2024).
- National Cyber Security Center. Guidelines for National Information Security; Republic of Korea. Revised on 31 January 2023. Available online: https://www.ncsc.go.kr:4018/main/cop/bbs/selectBoardArticle.do?bbsId=InstructionGuide_main&nttId=18588&pageIndex=1#LINK (accessed on 16 December 2024).
- National Cyber Security Center. Guidelines for National Cloud Computing Security; Republic of Korea. Revised on 31 January 2023. Available online: https://www.ncsc.go.kr:4018/main/cop/bbs/selectBoardArticle.do?bbsId=InstructionGuide_main&nttId=18590&pageIndex=1#LINK (accessed on 16 December 2024).
- United States Congress. E-Government Act of 2002 (Public Law 107-347). Available online: https://www.congress.gov/bill/107th-congress/senate-bill/803 (accessed on 16 December 2024).
- Ross, R. Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy; Special Publication (NIST SP); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2018. [CrossRef]
- National Cyber Security Center. Trends in the Promotion of National Cybersecurity Policy. NCSC. Available online: https://www.ncsc.go.kr:4018/main/cop/bbs/selectBoardArticle.do?bbsId=Notification_main&nttId=174371&menuNo=010000&subMenuNo=010300&thirdMenuNo=#LINK (accessed on 19 December 2024).
- Jericho Forum. Jericho Forum Looks to Bring Network Walls Tumbling Down. Available online: https://www.csoonline.com/article/515503/data-protection-jericho-forum-looks-to-bring-network-walls-tumbling-down.html (accessed on 28 September 2024).
- Kindervag, J. Build Security into Your Network’s DNA: The Zero Trust Network Architecture; Forrester Research Inc.: Cambridge, MA, USA, 2010; pp. 1–16. Available online: https://www.actiac.org/system/files/Forrester_zero_trust_DNA.pdf (accessed on 10 September 2024).
- NIST SP 800-207; Zero Trust Architecture. National Institute of Standards and Technology: Gaithersburg, MD, USA, 2020.
- NIST SP 800-35 (Initial Public Draft); Implementing a Zero Trust Architecture. National Institute of Standards and Technology (NIST): Gaithersburg, MD, USA, 2024.
- National Institute of Standards and Technology (NIST). Implementing a Zero Trust Architecture; NIST Special Publication 1800-35 (Initial Public Draft); National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024. Available online: https://csrc.nist.gov/pubs/sp/1800/35/ipd (accessed on 9 December 2024).
- National Institute of Standards and Technology (NIST). Framework for Improving Critical Infrastructure Cybersecurity; Version 1.1; NIST: Gaithersburg, MD, USA, 2018. [CrossRef]
- Pascoe, C.E. The NIST Cybersecurity Framework 2.0; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2024. [CrossRef]
- National Cyber Security Center. The Direction of ROK’s Cybersecurity Policy. Available online: https://cybersummit.kr/eng/p2/c2/?d=2&tab=5&i=22 (accessed on 20 October 2024).
- Bush, M.; Mashatan, A. From zero to one hundred: Demystifying zero trust and its implications on enterprise people, process, and technology. Queue 2022, 20, 80–106. [Google Scholar] [CrossRef]
- Roy, S.; Phadke, A.C. A Review on Zero Trust—Balancing Security and Usability Needs. Grenze Int. J. Eng. Technol. 2023, 9, 2622–2629. [Google Scholar]
- Shen, Q.; Shen, Y. Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach. Comput. Secur. 2024, 136, 103537. [Google Scholar] [CrossRef]
- Daah, C.; Qureshi, A.; Awan, I.; Konur, S. Enhancing zero trust models in the financial industry through blockchain integration: A proposed framework. Electronics 2024, 13, 865. [Google Scholar] [CrossRef]
- Ministry of Science and ICT (MSIT); Korea Internet & Security Agency (KISA); Korea Zero Trust Forum (KZTF). Zero Trust Security Guidelines 2.0; Ministry of Science and ICT; Korea Internet & Security Agency; Korea Zero Trust Forum: Seoul, Republic of Korea, 2024. Available online: https://www.kisa.or.kr/2060204/form?postSeq=18&page=1#fnPostAttachDownload (accessed on 9 December 2024).
- ISO 22340:2024; Security and Resilience—Protective Security—Guidelines for an Enterprise Protective Security Architecture and Framework. International Organization for Standardization (ISO): Geneva, Switzerland, 2024. Available online: https://www.iso.org/standard/85607.html (accessed on 27 September 2024).
- Cybersecurity and Infrastructure Security Agency (CISA). Zero Trust Maturity Model; Version 2.0; CISA: Washington, DC, USA, 2023. Available online: https://www.cisa.gov/zero-trust-maturity-model (accessed on 24 October 2024).
- Bell, D.E. Looking back at the Bell-La Padula model. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC’05), Tucson, AZ, USA, 5–9 December 2005; p. 15. [Google Scholar]
- ISO/IEC 27002:2022; Information Security, Cybersecurity and Privacy Protection—Information Security Controls. International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC): Geneva, Switzerland, 2022. Available online: https://www.iso.org/standard/75652.html (accessed on 27 September 2024).
- Bae, Y.S. A study of effect of Information Security Management System [ISMS] certification on organization performance. J. Korea Acad.-Ind. Coop. Soc. 2012, 13, 4224–4233. [Google Scholar]
- Kim, D.H. The Study on Corporate Information Security Governance Model for CEO. Converg. Secur. J. 2017, 17, 39–44. [Google Scholar]
- Lakbabi, A.; Orhanou, G.; Hajji, S.E. Network Access Control Technology-Proposition to contain new security challenges. arXiv 2013, arXiv:1304.0807. [Google Scholar] [CrossRef]
- Korean National Police Agency. Defense Industry Hacking Attacks Revealed; Korean National Police Agency: Seoul, Republic of Korea, 2024. Available online: https://www.police.go.kr/component/file/ND_fileDownload.do?q_fileSn=157251&q_fileId=785128b4-1d02-43e4-a4ef-a6639437650e (accessed on 1 September 2024).
- National Security Agency (NSA). Embracing a Zero Trust Security Model; National Security Agency: Fort Meade, MD, USA, 2021. Available online: https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.pdf (accessed on 12 September 2024).
- F5 Labs. 2023 Identity Threat Report: The Unpatchables; F5 Labs: Seattle, WA, USA, 2023; Available online: https://www.f5.com/content/dam/f5-labs-v2/article/pdfs/F5-LABS-2023-Identity-Report-01NOV23.pdf (accessed on 22 December 2024).
Questions | Korea | US |
---|---|---|
Policy and Regulation | - National Information Security Basic Guidelines [20] - National Cloud Computing Security Guidelines [21] | - E-Government Act of 2002 (Public Law 107-347) [22] - Federal Information Security Management Act of 2002 (FISMA) [10] |
Purpose | Enhancing security by applying different levels of security based on the importance of business information and information systems while fostering conditions for the utilisation of AI, cloud technologies, and public data in the public sector. | Providing criteria for classifying information systems and determining security levels to consistently apply the federal government’s security policies and procedures within the RMF (Risk Management Framework) environment [23]. |
Applicable Target | Central Government, Local Government, Public Institutions | Federal agencies |
Security categorisation | The sensitivity of the data stored, used, and processed by the system - Classified, Sensitive, Open | Information and information system potential impact - Low, Moderate, High |
Base document | National Network Security Framework Guidelines (Scheduled for publication in February 2025) [24] | FIPS 199 (Standards for Security Categorisation) [19] |
General Risks | Description |
---|---|
Data Tampering | Possibility of decreased reliability due to unauthorised modification of data. |
Insider Threat | Potential for insiders to leak or misuse data without authorisation. |
Unauthorized Access | Risk of unauthorised users accessing the system. |
Malware and Ransomware Infection | Potential for data loss or system failure due to malware infection. |
Privilege Abuse | Possibility of authorised users improperly accessing or modifying data. |
Poor Log Management | Limitations in detecting and tracking abnormal activities. |
Phishing and Social Engineering Attacks | Risk of users being deceived into leaking data or credentials being stolen. |
Data Backup Failure | Failure to recover data during system failures. |
Device Loss and Theft | Risk of data exposure due to device loss or theft. |
DoS and DDoS Attacks | Attacks that compromise availability through denial-of-service. |
Network Security Vulnerabilities | Risk of external attacks if network security is weak. |
Administrator Privilege Compromise | Possibility of unauthorised access to critical national data if administrator privileges are stolen. |
Lack of User Security Awareness | Potential for basic security incidents due to users’ lack of security awareness. |
Potential Risks | Description |
---|---|
National Secret Leakage | Risk of exposing classified information that could severely impact national security if leaked. |
Cyber Terrorism and Attacks | Risk of data leakage or destruction due to attacks targeting critical national assets. |
Real-Time Monitoring Failure | Potential risks arising from the failure of real-time monitoring. |
Physical Security Breach | Risk of intrusion, theft, or tampering at physical locations where data are stored. |
Encryption Key Management Failure | Risk of exposing encrypted confidential information due to compromised encryption keys. |
High-Risk System Vulnerabilities | Potential for external attacks due to system vulnerabilities. |
Lack of Regular Security Audits | Risk of security defects being exposed if periodic audits are not conducted. |
Potential Risk | Description |
---|---|
Personal Information Leakage | Risk of personal information being leaked, leading to violations of individual rights and identity theft. |
Data Integrity Compromise | Risk of Sensitive data being tampered with, providing incorrect information to individuals. |
Sensitive Data Leakage from Privilege Abuse | Risk of authorised users misusing sensitive information. |
Inadequate Access Control for External Contractors | Risk posed by external personnel handling sensitive information not adhering to security procedures. |
Insufficient Periodic Access Rights Review | Risk of unauthorised individuals accessing data for extended periods due to inadequate access rights reviews. |
Unauthorised Access to Backup Data | Risk of unauthorised access to backed-up Sensitive data. |
Missing Log Records | Risk of missing logs of sensitive information access, making it difficult to trace causes in case of incidents. |
Insufficient Auditing | Risk of security issues arising from inadequate audits of sensitive information access. |
Potential Risks | Description |
---|---|
Unauthorised Information Modification | Risk of public information being altered, potentially compromising its reliability. |
Public Data Deletion | Risk of public data being deleted, preventing the seamless provision of services. |
Lack of Basic Access Control | Risk of unauthorised individuals easily accessing and viewing information. |
Security Vulnerabilities Due to Unpatched Systems | Risk of the system being exposed to attacks due to the lack of the latest patches. |
Information Distortion | Risk of public information being tampered with, leading to the dissemination of incorrect information. |
General Phishing Attacks | Risk of information being misused due to providers being deceived by phishing attacks. |
Network Configuration Errors | Risk of service disruption due to availability issues caused by network configuration errors. |
Poor Device Management | Risk of physical security being compromised if public information devices are lost or stolen. |
Key Components | Description |
---|---|
Subject | The entity attempting to access a resource, including users or endpoint devices (e.g., mobile, PC). |
Network Segregation System | Refers to the network segregation device, providing physical/logical separation between the internal network (where C-grade resources are located) and the external network connected to the internet. It may facilitate data transfer between networks through a network connection solution. |
Policy Decision Point (PDP) | Composed of the Policy Engine (PE) and Policy Administrator (PA), it decides whether to approve or deny access requests and commands the PEP accordingly. |
Policy Engine (PE) | An entity responsible for approving access requests based on trust evaluation algorithms. |
Policy Administrator (PA) | An entity that communicates the start and end of sessions to the PEP based on decisions made by the Policy Engine. |
Policy Enforcement Point (PEP) | An entity that connects the subject to the resource based on the commands from the PDP and ultimately terminates the connection. |
Supporting Components | Organisational policies, logs, and other information used by the PE to evaluate access requests. |
Questions | ZT-Based MLS Model | CISA Maturity Model [39] | Bell–Lapadula Model [40] (MLS-Basis) |
---|---|---|---|
What is the type of the model? | Convergence model (ZT+MLS) | Single model | Single model |
Does it propose a specific model? | To implement a Zero-Trust-based network, we propose a dynamic access control model based on the importance of key components and data | Presents a simple pillar-based maturity model | A model that describes a set of access control rules using security labels on objects and permissions on subjects |
Does it consider additional technologies or strategies for improving security? | Considered In particular, a flexible network separation control strategy for introducing new technologies such as AI for the Classified level is presented | None | None |
Does it propose security controls or capabilities? | Specific security controls for each component (e.g., PEP: AC-3-2: Dynamic Information Flow Control) | High-level capabilities for each pillar (Not specific. Vague and abstract) | None |
Does it classify and provide security controls or capabilities focused on data protection? | Provides security controls for the sensitivity of data used, utilised, and processed in the organisation | Presenting capabilities focused on maturity | None |
What is the basis for the classification of security labels? | Classification by data sensitivity - Classified, Sensitive, Open | Classification by maturity - Traditional, Initial, Advanced, Optimal | Classification of subject and object - Top secret, Secret, Confidential, Unclassified |
Control | Specific Controls | C | S | O |
---|---|---|---|---|
AC-6 Remote Access (AC-17) | AC-6-1: Protection of Confidentiality and Integrity Using Encryption | √ | √ | |
AC-6-2: Privileged Commands and Access | √ | √ | √ | |
AC-6-3: Disconnect or Disable Access | √ | √ | √ | |
AC-6-4: Authenticate Remote Commands | √ | √ | √ | |
AC-9 External Systems (AC-20) | AC-9-1: Limits on Authorised Use | √ | √ | |
AC-9-2: Non-Organisationally Owned Systems: Restricted Use | √ | √ | ||
AC-9-3: Network Accessible Storage Devices: Prohibited Use | √ | √ | ||
CA-1 Continuous Monitoring (CA-7) | CA-1-1: Trend Analysis | √ | √ | √ |
CA-1-2: Risk Monitoring | √ | √ | √ | |
CA-1-3: Automation Support for Monitoring | √ | √ | √ | |
SC-3 Transmission Confidentiality and Integrity (SC-8) | Sc-3-1: Cryptographic Protection | √ | √ | √ |
SC-3-2: Conceal or Randomise Communications | √ | √ | ||
SC-5 Cryptographic Protection (SC-13) | SC-5: Cryptographic Protection | √ | √ | √ |
CM-1 Baseline Configuration (CM-2) | CM-1-1: Automation Support for Accuracy and Currency | √ | √ | √ |
CM-1-2: Retention of Previous Configurations | √ | √ | √ | |
CM-1-3: Development and Test Environments | √ | √ | √ | |
CM-2 Impact Analysis (CM-4) | CM-2-1: Separate Test Environments | √ | √ | √ |
CM-2-2: Verification of Controls | √ | √ | √ | |
CM-3 Configuration Settings (CM-6) | CM-3-1: Automated Management, Application, and Verification | √ | √ | √ |
CM-3-2: Respond to Unauthorised Changes | √ | √ | √ | |
CM-4 Software Usage Restrictions (CM-10) | CM-4: Software Usage Restrictions | √ | √ | √ |
CM-5 User Installed Software (CM-11) | CM-5-1: Software Installation with Privileged Status | √ | ||
CM-6 Signed Components (CM-14) | CM-6: Signed Components | √ | √ | √ |
RA-1 Risk Assessment (RA-3) | RA-1-1: Supply Chain Risk Assessment | √ | √ | √ |
RA-1-2: Use of All Source Intelligence | √ | √ | √ | |
RA-1-3: Dynamic Threat Awareness | √ | √ | √ | |
RA-1-4: Predictive Cyber Analytics | √ | √ | √ | |
RA-2 Vulnerability Monitoring and Scanning (RA-5) | RA-2-1: Impact-Level Prioritisation | √ | √ | |
SI-1 Flaw Remediation (SI-2) | SI-1-1: Automated Flow Remediation Status | √ | √ | |
SI-1-2: Automated Patch Management Tools | √ | √ | √ | |
SI-1-3: Automatic Software and Firmware Updates | √ | √ | √ | |
SI-1-4: Removal of Previous Versions of Software and Firmware | √ | √ | √ | |
SI-2 Malicious Code Protection (SI-3) | SI-2-1: Update Only by Privileged Users | √ | √ | √ |
SI-2-2: Detect Unauthorised Commands | √ | √ | √ | |
SI-2-3: Malicious Code Analysis | √ | |||
SI-5 Software, Firmware, and Information Integrity (SI-7) | SI-5-1: Integrity Checks | √ | √ | √ |
SI-5-2: Automation Support for Distributed Testing | √ | √ | ||
SI-5-3: Automated Notifications of Integrity Violations | √ | √ | ||
SI-5-4: Cryptographic Protection | √ | √ | √ | |
SI-5-5: Integration of Detection and Response | √ | √ | √ | |
SI-5-6: Auditing Capability for Significant Events | √ | √ | √ | |
SI-5-7: Integrity Verification | √ | √ | √ | |
SI-5-8: Time Limit on Process Execution Without Supervision | √ |
Control | Specific Controls | C | S | O |
---|---|---|---|---|
AC-1 Access Enforcement (AC-3) | AC-1-1: Dual Authorisation | √ | √ | |
AC-1-2: Assert and Enforce Application Access | √ | √ | √ | |
AC-1-3: Discretionary and Mandatory Access Control | √ | √ | √ | |
AC-6 Remote Access (AC-17) | AC-6-1: Protection of Confidentiality and Integrity Using Encryption | √ | √ | |
AC-6-2: Privileged Commands and Access | √ | √ | √ | |
AC-6-3: DISCONNECT OR DISABLE ACCESS | √ | √ | √ | |
AC-6-4: Authenticate Remote Commands | √ | √ | √ | |
AC-8 Access Control for Mobile Devices (AC-19) | AC-8-1: Restrictions for Classified Information | √ | √ | |
AC-8-2: Full-Device- or Container-Based Encryption | √ | √ | ||
AC-9 External Systems (AC-20) | AC-9-1: Limits on Authorised Use | √ | √ | |
AC-9-2: Non-Organisationally Owned Systems: Restricted Use | √ | √ | ||
AC-9-3: Network Accessible Storage Devices: Prohibited Use | √ | √ | ||
AC-10 Access Control Decisions (AC-24) | AC-10-1: Transmit Access Authorisation Information | √ | √ | √ |
AC-10-2: No User of Process Identity | √ | √ | √ | |
SC-6 Collaborative Computing Devices and Applications (SC-15) | SC-6-1: Physical or Logical Disconnect | √ | √ |
Control | Specific Controls | C | S | O |
---|---|---|---|---|
AC-1 Access Enforcement (AC-3) | AC-1-1: Dual Authorisation | √ | √ | |
AC-1-2: Assert and Enforce Application Access | √ | √ | √ | |
AC-1-3: Discretionary and Mandatory Access Control | √ | √ | √ | |
AC-2 Account Management (AC-2) | AC-2-1: Automated System Account Management | √ | √ | |
AC-2-2: Disable Accounts | √ | √ | √ | |
AC-2-3: Automated Audit Action | √ | √ | ||
AC-2-4: Inactivity Logout | √ | √ | √ | |
AC-2-5: Dynamic Privilege Management | √ | √ | √ | |
AC-2-6: Privileged User Accounts | √ | √ | √ | |
AC-2-7: Dynamic Account Management | √ | √ | √ | |
AC-2-8: Account Monitoring for Atypical Usage | √ | √ | √ | |
AC-3 Information Flow Enforcement (AC-4) | AC-3-1: Object Security and Privacy Attributes | √ | √ | √ |
AC-3-2: Dynamic Information Flow Control | √ | √ | √ | |
AC-3-3: Flow Control of Encrypted Information | √ | √ | √ | |
AC-3-4: One-Way Flow Mechanism | √ | √ | ||
AC-3-5: Security and Privacy Policy Filters | √ | √ | √ | |
AC-3-6: Human Reviews | √ | √ | ||
AC-3-7: Data Type Identifiers | √ | √ | √ | |
AC-3-8: Detection of Unsanctioned Information | √ | √ | √ | |
AC-3-9: Approved Solutions | √ | √ | √ | |
AC-3-10: Physical or Logical Separation of Information Flows | √ | |||
AC-3-11: Modify Non-Releasable Information | √ | √ | √ | |
AC-3-12: Data Sanitisation | √ | |||
AC-3-13: Filter Orchestration Engines | √ | √ | √ | |
AC-4 Session Termination (AC-12) | AC-4-1: Timeout Warning Message | √ | √ | |
AC-6 Remote Access (AC-17) | AC-6-1: Protection of Confidentiality and Integrity Using Encryption | √ | √ | |
AC-6-2: Privileged Commands and Access | √ | √ | ||
AC-6-3: Disconnect or Disable Access | √ | √ | ||
AC-6-4: Authenticate Remote Commands | √ | √ | ||
AC-7 Wireless Access (AC-18) | AC-7-1: Authentication and Encryption | √ | √ | |
AC-7-2: Disable Wireless Networking | √ | √ | ||
AC-8 Access Control for Mobile Devices (AC-19) | AC-8-1: Restrictions for Classified Information | √ | √ | |
AC-8-2: Full-Device- or Container-Based Encryption | √ | √ | ||
AC-9 External Systems (AC-20) | AC-9-1: Limits on Authorised Use | √ | √ | |
AC-9-2: Non-Organisationally Owned Systems: Restricted Use | √ | √ | ||
AC-9-3: Network Accessible Storage Devices: Prohibited Use | √ | √ | ||
CA-1 Continuous Monitoring (CA-7) | CA-1-1: Trend Analysis | √ | √ | √ |
CA-1-2: Risk Monitoring | √ | √ | √ | |
CA-1-3: Automation Support for Monitoring | √ | √ | √ | |
IR-1 Incident Handling (IR-4) | IR-1-1: Automated Incident Handling Processes | √ | √ | √ |
IR-1-2: Dynamic Reconfiguration | √ | √ | √ | |
IR-1-3: Continuity of Operation | √ | √ | √ | |
IR-1-4: Information Correlation | √ | √ | √ | |
SC-2 Boundary Protection (SC-7) | SC-2-1: Physically Separated Subnetworks | √ | ||
SC-2-2: Access Point | √ | |||
SC-2-3: Deny by Default—Allow by Exception | √ | √ | ||
SC-2-4: Restrict Threatening Outgoing Communication Traffic | √ | √ | ||
SC-2-5: Prevent Exfiltration | √ | √ | ||
SC-2-6: Restrict Incoming Communication Traffic | √ | √ | ||
SC-2-7: Project Against Unauthorised Physical Connections | √ | √ | ||
SC-2-8: Prevent Discovery of System Component | √ | √ | ||
SC-2-9: Block Communication from Non-Organisationally Configured Hosts | √ | √ | ||
SC-2-10: Personally Identifiable Information | √ | √ | ||
SC-2-11: Classified National Security System Connections | √ | |||
SC-2-12: Connections to Public Networks | √ | |||
SC-6 Collaborative Computing Devices and Applications (SC-15) | SC-6-1: Physical or Logical Disconnect | √ | √ | |
SC-7 Session Authenticity (SC-23) | SC-7-1: Invalidate Session Identifiers at Logout | √ | √ | √ |
SC-7-2: Allowed Certificate Authorities | √ | √ | √ | |
SC-9 System Partitioning (SC-32) | SC-9-1: Separate Physical Domains for Privileged Functions | √ | √ | √ |
SC-10 Port and I/O Device Access (SC-41) | SC-10: Port and I/O Device Access | √ | √ | √ |
SC-11 Usage Restrictions (SC-4) | SC-11: Usage Restrictions | √ | √ | √ |
SI-3 System Monitoring (SI-4) | SI-3-1: System-Wide Intrusion Detection System | √ | √ | √ |
SI-3-2: Automated Tools and Mechanisms for Real-Time Analysis | √ | √ | √ | |
SI-3-3: Automated Tool and Mechanism Integration | √ | √ | √ | |
SI-3-4: Inbound and Outbound Communication Traffic | √ | √ | √ |
Control | Specific Controls | C | S | O |
---|---|---|---|---|
SC-8 Protection of Information at Rest (SC-28) | SC-8-1: Cryptographic Protection | √ | √ | |
SC-8-2: Offline Storage | √ | √ | ||
SC-8-3: Cryptographic Keys | √ | √ | ||
AC-6 Remote Access (AC-17) | AC-6-1: Protection of Confidentiality and Integrity Using Encryption | √ | √ | |
AC-6-2: Privileged Commands and Access | √ | √ | √ | |
AC-6-3: Disconnect or Disable Access | √ | √ | √ | |
AC-6-4: Authenticate Remote Commands | √ | √ | √ | |
SC-3 Transmission Confidentiality and Integrity (SC-8) | SC-3-1: Cryptographic Protection | √ | √ | |
SC-3-2: Conceal or Randomise Communications | √ | √ | ||
SC-4 Cryptographic Key Establishment and Management (SC-12) | SC-4-1: Availability | √ | √ | |
SC-4-2: Symmetric Keys | √ | √ | ||
SC-4-3: Asymmetric Keys | √ | √ | √ | |
AC-5 Security and Privacy Attributes (AC-16) | AC-5-1: Dynamic Attribute Association | √ | √ | √ |
AC-5-2: Maintenance of Attribute Association by Individuals | √ | √ | √ | |
AC-5-3: Attribute Displays on Objects to be Output | √ | √ | √ | |
AC-5-4: Consistent Attribute Interpretation | √ | √ | √ | |
AC-5-5: Attribute Reassignment—Regrading Mechanisms | √ | √ | ||
SC-1 Information in Shared System Resources (SC-4) | SC-1-2: Multi-Level or Periods Processing | √ | √ | √ |
SC-8 Protection of Information at Rest (SC-28) | SC-8-1: Cryptographic Protection | √ | √ | |
SC-8-2: Offline Storage | √ | √ | ||
SC-8-3: Cryptographic Keys | √ | √ | ||
SC-2 Boundary Protection (SC-7) | SC-2-1: Physically Separated Subnetworks | √ | ||
SC-2-2: Access Point | √ | |||
SC-2-3: Deny by Default—Allow by Exception | √ | √ | ||
SC-2-4: Restrict Threatening Outgoing Communication Traffic | √ | √ | ||
SC-2-5: Prevent Exfiltration | √ | √ | ||
SC-2-6: Restrict Incoming Communication Traffic | √ | √ | ||
SC-2-7: Project Against Unauthorised Physical Connections | √ | √ | ||
SC-2-8: Prevent Discovery of System Component | √ | √ | ||
SC-2-9: Block Communication from Non-Organisationally Configured Hosts | √ | √ | ||
SC-2-10: Personally Identifiable Information | √ | √ | ||
SC-2-11: Classified National Security System Connections | √ | |||
SC-2-12: Connections to Public Networks | √ |
Control | Specific Controls | C | S | O |
---|---|---|---|---|
AC-1 Access Enforcement (AC-3) | AC-1-1: Dual Authorisation | √ | √ | |
AC-1-2: Assert and Enforce Application Access | √ | √ | √ | |
AC-1-3: Discretionary and Mandatory Access Control | √ | √ | √ | |
AC-2 Account Management (AC-2) | AC-2-1: Automated System Account Management | √ | √ | |
AC-2-2: Disable Accounts | √ | √ | √ | |
AC-2-3: Automated Audit Action | √ | √ | ||
AC-2-4: Inactivity Logout | √ | √ | √ | |
AC-2-5: Dynamic Privilege Management | √ | √ | √ | |
AC-2-6: Privileged User Accounts | √ | √ | √ | |
AC-2-7: Dynamic Account Management | √ | √ | √ | |
AC-2-8: Account Monitoring for Atypical Usage | √ | √ | √ | |
AC-3 Information Flow Enforcement (AC-4) | AC-3-1: Object Security and Privacy Attributes | √ | √ | √ |
AC-3-2: Dynamic Information Flow Control | √ | √ | √ | |
AC-3-3: Flow Control of Encrypted Information | √ | √ | √ | |
AC-3-4: One-Way Flow Mechanism | √ | √ | ||
AC-3-5: Security and Privacy Policy Filters | √ | √ | √ | |
AC-3-6: Human Reviews | √ | √ | ||
AC-3-7: Data Type Identifiers | √ | √ | √ | |
AC-3-8: Detection of Unsanctioned Information | √ | √ | √ | |
AC-3-9: Approved Solutions | √ | √ | √ | |
AC-3-10: Physical or Logical Separation of Information Flows | √ | |||
AC-3-11: Modify Non-Releasable Information | √ | √ | √ | |
AC-3-12: Data Sanitisation | √ | |||
AC-3-13: Filter Orchestration Engines | √ | √ | √ | |
AC-10 Access Control Decisions (AC-24) | AC-10-1: No User or Process Identity | √ | √ | √ |
AC-11 Separation of duties (AC-5) | AC-11: Separation of Duties | √ | √ | √ |
AC-12 Least Privilege (AC-6) | AC-12-1 Authorise Access to Security Functions | √ | √ | |
AC-12-2: Non-Privileged Access for Non-security Functions | √ | √ | √ | |
AC-12-3: Network Access to Privileged Commands | √ | √ | ||
AC-12-4: Separate Processing Domains | √ | √ | ||
AC-12-5: Privileged Accounts | √ | √ | ||
AC-12-6: Privileged Access by Non-Organisational Users | √ | √ | ||
AC-12-7: Review of User Privileges | √ | √ | √ | |
AC-12-8: Privilege Levels for Code Execution | √ | √ | √ | |
AC-12-9: Log Use of Privileged Functions | √ | √ | √ | |
AC-12-10: Prohibit Non-Privileged Users from Executing Privileged Functions | √ | √ | √ | |
IA-1 Policy and Procedures (IA-1) | IA-1: Policy And Procedures | √ | √ | √ |
IA-2 Identification and Authentication (Organizational Users) (IA-2) | IA-2-1: Multi-Factor Authentication to Privileged Accounts | √ | √ | |
IA-2-2 Multi-Factor Authentication to Non-Privileged Accounts | √ | √ | ||
IA-2-3 Individual Authentication with Group Authentication | √ | √ | ||
IA-2-4 Access to Accounts—Separate Device | √ | √ | ||
IA-2-5: Access to Accounts—Replay Resistant | √ | √ | ||
IA-2-6: Acceptance of PIV Credentials | √ | √ | ||
IA-2-7: Out-Of-Band Authentication | √ | √ | ||
IA-3 Device Identification and Authentication (IA-3) | IA-3-1: Cryptographic Bidirectional Authentication | √ | √ | |
IA-3-2: Device Attestation | √ | √ | ||
IA-4 Authentication Management (IA-5) | IA-4-1: Password-Based Authentication | √ | √ | |
IA-4-2: Public-Key-Based Authentication | √ | √ | ||
IA-4-3: Protection of Authenticators | √ | √ | √ | |
IA-4-4: Multiple System Accounts | √ | √ | ||
IA-4-5: Federated Credential Management | √ | √ | ||
IA-4-6: Biometric Authentication Performance | √ | √ | ||
IA-4-7: Expiration of Cached Authenticators | √ | √ | √ | |
IA-4-8: Managing Content of PKI Trust Stores | √ | √ | ||
IA-4-9: Presentation Attack Detection for Biometric Authenticators | √ | √ | ||
IA-4-10: Password Managers | √ | √ | √ | |
IA-5 Identification and Authentication (Non-Organizational Users) (IA-8) | IA-5-1: Acceptance of PIV Credentials from Other Agencies | √ | √ | |
IA-5-2: Acceptance of External Authenticators | √ | √ | ||
IA-5-3: Use of Defined Profiles | √ | √ | ||
IA-5-4: Acceptance Of PIV-I Credentials | √ | √ | ||
IA-5-5: Disassociability | √ | √ | ||
IA-6 Service Identification and Authentication (IA-9) | IA-6: Service Identification and Authentication | √ | √ | |
IR-1 Incident Handling (IR-4) | IR-1-1: Automated Incident Handling Processes | √ | √ | √ |
IR-1-2: Dynamic Reconfiguration | √ | √ | √ | |
IR-1-3: Continuity of Operation | √ | √ | √ | |
IR-1-4: Information Correlation | √ | √ | √ |
Security Solutions in Real World | Controls |
---|---|
Network Access Control (NAC) | AC-6: Remote Access (AC-17) |
CM-3: Configuration Settings (CM-6) | |
Intrusion Detection System (IDS) | CA-1: Continuous Monitoring (CA-7) |
RA-2: Vulnerability Monitoring and Scanning (RA-5) | |
Intrusion Prevention System (IPS) | AC-6: Remote Access (AC-17) |
AC-9: External Systems (AC-20) | |
Security Information Event Management (SIEM) | CA-1: Continuous Monitoring (CA-7) |
CM-2: Impact Analysis (CM-4) | |
RA-1: Risk Assessment (RA-3) | |
Firewall | AC-6: Remote Access (AC-17) |
AC-9: External Systems (AC-20) | |
Virtual Private Network (VPN) | SC-3: Transmission Confidentiality and Integrity (SC-8) |
DB Crypto Solution | SC-5: Cryptographic Protection (SC-13) |
SI-5: Software, Firmware, and Information Integrity (SI-7) | |
Patch Management System (PMS) | SI-1: Flaw Remediation (SI-3) |
CM-1: Baseline Configuration (CM-2) | |
CM-6: Signed Components (CM-14) | |
Anti-Virus (AV) | SI-1: Flaw Remediation (SI-3) |
SI-2: Malicious Code Protection (SI-3) | |
CM-6: Signed Components (CM-14) | |
Data Loss Prevention (DLP) | SC-3: Transmission Confidentiality and Integrity (SC-8) |
Identity and Access Management (IAM) | CM-4: Software Usage Restrictions (CM-10) |
CM-5: User Installed Software (CM-11) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Park, J.-H.; Park, S.-C.; Youm, H.-Y. A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls. Appl. Sci. 2025, 15, 785. https://doi.org/10.3390/app15020785
Park J-H, Park S-C, Youm H-Y. A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls. Applied Sciences. 2025; 15(2):785. https://doi.org/10.3390/app15020785
Chicago/Turabian StylePark, Jun-Hyung, Sung-Chae Park, and Heung-Youl Youm. 2025. "A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls" Applied Sciences 15, no. 2: 785. https://doi.org/10.3390/app15020785
APA StylePark, J.-H., Park, S.-C., & Youm, H.-Y. (2025). A Proposal for a Zero-Trust-Based Multi-Level Security Model and Its Security Controls. Applied Sciences, 15(2), 785. https://doi.org/10.3390/app15020785