Zero Trust Zero Trust Reference Architecture Technology Guide 1668697587
Zero Trust Zero Trust Reference Architecture Technology Guide 1668697587
Authors 1 Introduction
Xiang Wang Secure Access Service Edge (SASE) is becoming a major trend to deliver an architecture of
converged security as a service on edge and cloud. As a critical function in SASE, Zero Trust
Heqing Zhu
Network Access (ZTNA) replaces legacy castle-and-moat approach (Perimeter Security),
Hongjun Ni which builds a stack of network security functions in a predefined corporate perimeter. The
enterprise network trend that remote workers, bring your own device (BYOD), and cloud-
Yun Lan
centric services are not located within an enterprise-owned network boundary is driving the
Ju Huang deployment of ZTNA. It assumes least privilege and avoids lateral movement between
resources. Enterprises are adopting zero trust solutions in a rapid pace. Gartner estimates
John DiGiglio
that 60% of enterprises will phase out their remote access virtual private networks (VPN) in
Michihiro Koyama favor of ZTNA by 2023.
Pradeepsunder Ganesh The National Institute of Standards and Technology (NIST) publishes a specification on zero
trust architecture, which is the cornerstone of zero trust solutions currently. Intel has a broad
set of security technologies that could optimize zero trust architecture with enhanced
security and accelerated performance.
This paper introduces Zero Trust Reference Architecture (ZTRA) with Intel confidential
computing technology, a reference design to realize the ZTNA standards, delivering core
features including user authentication, service authorization, and secure network tunnel
connection. ZTRA achieves security enforcement with Intel confidential computing
technology (for example, Intel® Secure Guard Extensions (Intel® SGX)) and WireGuard
tunnels as VPN service example. This reference also demonstrates the performance boost
with crypto acceleration on Intel® Xeon® Scalable processors. This provides a solid reference
on how to build a more secure and performant ZTNA system with the 3rd Gen Intel® Xeon®
Scalable processor that fulfills the requirements of enterprise.
This document is part of the Network Transformation Experience Kits.
1
Technology Guide | Zero Trust - Zero Trust Reference Architecture
Table of Contents
1 Introduction................................................................................................................................................................................................................1
1.1 Terminology ..............................................................................................................................................................................................................3
1.2 Reference Documentation .................................................................................................................................................................................3
2 Overview .....................................................................................................................................................................................................................4
3 Intel® Processor Technology .............................................................................................................................................................................4
3.1 3rd Gen Intel® Xeon® Scalable Processor and Intel® Xeon® D-2700/1700 Processors ...........................................................4
3.2 Intel Confidential Computing Technology ...................................................................................................................................................5
3.3 Intel Crypto Technology ......................................................................................................................................................................................6
4 Open-Source Software Technology ..............................................................................................................................................................6
4.1 HashiCorp Vault ......................................................................................................................................................................................................6
4.2 Headscale and Tailscale .......................................................................................................................................................................................7
4.3 Vector Packet Processing ...................................................................................................................................................................................7
5 Zero Trust Reference Architecture ................................................................................................................................................................ 7
5.1 User Authentication ..............................................................................................................................................................................................8
5.2 Service Authorization ...........................................................................................................................................................................................9
5.3 Data Plane Processing ......................................................................................................................................................................................... 11
6 ZTRA Deployment ................................................................................................................................................................................................ 11
6.1 Deployment Setup ................................................................................................................................................................................................ 11
6.1.1 Intel® SGX with Occlum Setup ........................................................................................................................................................................ 11
6.1.2 Vault Setup ..............................................................................................................................................................................................................12
6.1.3 VPP Setup ...............................................................................................................................................................................................................13
7 ZTRA Software Availability .............................................................................................................................................................................. 13
8 Summary .................................................................................................................................................................................................................. 13
Appendix A Platform Configuration.......................................................................................................................................................................................14
Figures
Figure 1. Zero Trust Architecture by NIST .................................................................................................................................................................... 4
Figure 2. Intel® Xeon® Processors ..................................................................................................................................................................................... 4
Figure 3. Intel® SGX Security Model ................................................................................................................................................................................ 5
Figure 4. ZTRA System Architecture Overview .......................................................................................................................................................... 8
Figure 5. Controller APP Registration Workflow ......................................................................................................................................................... 8
Figure 6. User Authentication Workflow......................................................................................................................................................................... 9
Figure 7. Service Authorization Workflow...................................................................................................................................................................... 9
Figure 8. RBAC Policy Example .........................................................................................................................................................................................10
Figure 9. Service Request Workflow ................................................................................................................................................................................ 11
Tables
Table 1. Terminology ............................................................................................................................................................................................................. 3
Table 2. Reference Documents ........................................................................................................................................................................................ 3
2
Technology Guide | Zero Trust - Zero Trust Reference Architecture
1.1 Terminology
Table 1. Terminology
Abbreviation Description
ACL Access Control List
AES Advanced Encryption Standard
AES-NI Intel® Advanced Encryption Standard New Instructions
BYOD Bring Your Own Device
Enclave Ring 3 application software running inside the Intel SGX protections
IDP Identity Providers
IPsec Internet Protocol Security
ISA Instruction Set Architecture
KMS Key Management System
NIST National Institute of Standards and Technology
OIDC OpenID Connect Authentication Protocol
RBAC Role Based Access Control
SASE Secure Access Service Edge
VPN Virtual Private Networks
VPP Vector Packet Processing
ZTNA Zero Trust Network Access
Reference Source
Intel® Xeon® Scalable Platform Built for Most Sensitive https://www.intc.com/news-events/press-releases/detail/1423/intel-xeon-
Workloads scalable-platform-built-for-most-sensitive
Crypto Acceleration: Enabling a Path to the Future of https://newsroom.intel.com/articles/crypto-acceleration-enabling-path-future-
Computing computing
Golang https://go.dev/
HashiCorp Vault https://www.Vaultproject.io/
https://medium.com/hashicorp-engineering/hashicorp-Vault-performance-
benchmark-13d0ea7b703f
Occlum https://github.com/occlum/occlum
Intel SGX Programming Reference and SDK for Linux https://software.intel.com/content/www/us/en/develop/articles/intel-
sdm.html#combined
https://download.01.org/intel-sgx/latest/linux-latest/docs/
https://github.com/intel/linux-sgx
National Institute of Standards and Technology FIPS https://csrc.nist.gov/publications/detail/fips/197/final
Publication 197, Advanced Encryption Standard (AES)
3rd Generation Intel® Xeon® Scalable Processor - https://networkbuilders.intel.com/solutionslibrary/3rd-generation-intel-xeon-
Achieving 1 Tbps IPsec with Intel® Advanced Vector scalable-processor-achieving-1-tbps-ipsec-with-intel-advanced-vector-
Extensions 512 (Intel® AVX-512) Technology Guide extensions-512-technology-guide
Create Intel SGX VM in the Azure portal https://docs.microsoft.com/en-us/azure/confidential-computing/quick-create-
portal
Intel® Software Guard Extensions (Intel® SGX) – Key https://networkbuilders.intel.com/solutionslibrary/intel-sgx-kmra-on-intel-xeon-
Management Reference Application (KMRA) on Intel® processors-technology-guide
Xeon® Processors Technology Guide
Intel® Software Guard Extensions (Intel® SGX) - Key https://networkbuilders.intel.com/solutionslibrary/intel-sgx-kmra-on-intel-xeon-
Management Reference Application (KMRA) on Intel® processors-user-guide
Xeon® Scalable Processors User Guide
Intel® Software Guard Extensions (Intel® SGX) – https://networkbuilders.intel.com/intel-software-guard-extensions-intel-sgx-
Securing Private Keys in an Encrypted Enclave for securing-private-keys-in-an-encrypted-enclave-for-your-service-mesh-demo
Your Service Mesh Demo
Intel® AVX-512 and Intel® QAT - Accelerate https://networkbuilders.intel.com/solutionslibrary/intel-avx-512-and-intel-qat-
WireGuard Processing with Intel® Xeon® D-2700 accelerate-wireguard-processing-with-intel-xeon-d-2700-processor-technology-
Processor Technology Guide guide
3
Technology Guide | Zero Trust - Zero Trust Reference Architecture
2 Overview
A zero trust system shown in Figure 1 typically consists of endpoint client, controller (policy decision point), secure gateway
(policy enforcement point), and remote service. Client needs to build a connection with controller for identity authentication and
service authorization. Controller integrates with third party identity providers (IDP) for user authentication. It then generates
policies based on user’s identity and attributes to allow least privilege access to remote services. As a policy enforcement point,
the secure gateway in edge POP (Point of Presence) or cloud will pull access policies from controller and establish a secure
tunnel with client. Each network access from client will be evaluated by the secure gateway before reaching to the remote
service.
There are challenges in building such a reliable zero trust system:
1) Secrets are hard to protect. The core requirements of zero trust are authentication and authorization, which involve
generation and management of many credentials, including encryption keys, tokens, passwords, certificates, etc. It’s
critical to protect secrets at rest, in transit and in use.
2) Encrypted network tunnels are expensive. Every communication channel must be encrypted, including clients to edge
and even edge to cloud services. In encrypted network tunnels, asymmetric and symmetric crypto are compute
intensive.
3) Access controls are complex. Access evaluation must happen on every network access to achieve strict service micro-
segmentation. It requires lots of policy definitions and heavy process of role-based access control.
Intel security technologies bring added values to tackle these challenges.
4
Technology Guide | Zero Trust - Zero Trust Reference Architecture
As shown in Figure 2, 3rd Gen Intel Xeon Scalable processor delivers scalable performance for networking and security
workloads. It adds security features useful for zero trust compared with prior generation. Intel SGX secures data in memory,
enabling confidential computing. A key challenge in zero trust is to secure credentials (encryption keys, certificate, tokens, etc.).
Intel SGX brings security enforcement to protect these secrets. New vector Intel® Advanced Encryption Standard New
Instructions (AES-NI) and Intel® Advanced Vector Extensions 512 (Intel® AVX-512) instructions significantly boost crypto
performance in use cases such as SSL, VPN, and firewall. Secure tunnels are compute intensive in zero trust. These new
instructions could accelerate performance of zero trust system. Intel® Deep Learning Boost technology with Vector Neural
Network Instructions (VNNI) improves inference performance for deep learning workloads. As zero trust solutions start to
embrace AI for intelligent user to application segmentation, these build-in AI acceleration features could benefit zero trust
solutions. Overall, deploying zero trust solution with 3rd Gen Intel Xeon Scalable processor allows security and performance in
place.
Intel® Xeon® D-2700/1700 processors are SOC (System on Chip) designed to meet network edge usage models. They deliver
performance and security with better power and space efficiency. Advanced security features are available in Intel Xeon D-
2700/1700 Processors, including Intel SGX, crypto acceleration, Intel AVX-512, AI acceleration, etc. Their typical use cases
include network and security appliances, SASE, etc. Since ZTNA is a critical function in SASE, Intel Xeon D-2700/1700
processors are also platform of choice for zero trust deployment.
3.2 Intel Confidential Computing Technology
Since zero trust system has strict data privacy and stringent security requirements, protecting data in transit and at rest is
common practice, secure data in use (in memory) is not possible until Intel introduced the 3rd Gen Intel Xeon Scalable
processor (formerly code named Ice Lake). 3rd Gen Intel Xeon Scalable processor introduces Intel SGX to standard off the shelf
servers. This innovation allows the software to secure data in use.
Intel SGX offers hardware-based memory encryption that isolates specific application code and data in trusted execution
environment (TEE). Intel SGX allows user-level code to allocate private regions of memory, called enclaves, which are designed
to be protected from processes running at higher privilege levels. Intel SGX offers protection with a smaller available attack
surface within the system. As shown in Figure 3, the enclave memory cannot be read or written from outside the enclave
regardless of current privilege level and CPU mode, for example, operating systems, virtual machine managers, etc.
Intel SGX needs to go through attestation process to verify the hosting platform. Remote attestation allows a remote party to
check that the intended software is securely running within an enclave on a system with the Intel SGX enabled. Intel® Software
Guard Extensions Data Center Attestation Primitives (Intel® SGX DCAP) delivers the attestation service support for the
enterprise and cloud service providers.
The library operating system (LibOS) technology enables users to run native application software in an Intel SGX enclave
without extra modification efforts. Popular open-source LibOS solutions include Gramine and Occlum. By keeping credentials
(private keys, tokens, personal identity information, etc.) in an enclave, zero trust system avoids the risk of exposing secrets to
compromised users and external attackers.
At Intel, security comes first. For security technologies like Intel SGX, we integrate security principles at every lifecycle stage to
help ensure that products are built with security in mind. We deliver discovery through offensive security research, Product
Security Incident Response (PSIRT) and bug bounty. There is routinely sharing of security mitigations and updates.
5
Technology Guide | Zero Trust - Zero Trust Reference Architecture
6
Technology Guide | Zero Trust - Zero Trust Reference Architecture
7
Technology Guide | Zero Trust - Zero Trust Reference Architecture
8
Technology Guide | Zero Trust - Zero Trust Reference Architecture
9
Technology Guide | Zero Trust - Zero Trust Reference Architecture
ZTRA service authorization ensures least privilege access to services. It defines service access policy based on collected user
identity and device tags upon successful authentication. Secure gateway then pulls policies from controller and injects them to
VPP ACL engine for policy enforcement on every request sent from client. This is different from traditional VPN that only
checks user credential/password at connection setup stage and no further authorization is ever requested. Optimizations of
Intel AVX-512 on VPP ACL significantly boost matching performance.
Figure 7 shows service authorization workflow:
1. Client sends a service request to Controller.
2. Controller verifies Client identity (with public key) to grant if the user has the right to access this service. If granted,
Controller then generates ACL rules.
3. Controller returns assigned IP, peer info, etc. in the response to a valid Client.
4. Client configures TUN interface with IP, routes, etc.
5. Controller passes configuration messages (peer info, ACL, etc.) to agent via a TAP interface in VPP.
6. Agent configures ACL rules in VPP.
{
"acls": [
{
"Action": "accept",
"Users": ["tag:webdevice", "group:sre"],
"Ports": ["tag:webserver"]
}
// Other access rules here...
]
// Other policy configuration here...
}
10
Technology Guide | Zero Trust - Zero Trust Reference Architecture
4. VPP WireGuard (accelerated by Intel AVX-512) receives the traffic from the endpoint.
5. VPP enforces ACL policy for service authorization.
6. VPP forwards the traffic to remote service only when the client has appropriate access privilege
6 ZTRA Deployment
This section shows the basic deployment of ZTRA solution. It covers detailed install instructions for core components in ZTRA.
6.1 Deployment Setup
6.1.1 Intel® SGX with Occlum Setup
1. Intel SGX setup for Vault
Occlum Golang toolchain only supports go1.16.3. We chose Vault v1.8.9 for compatibility reason. As Vault needs to make
external https connections, we build Occlum instance by using host certificate in /etc/ssl/certs/. We also should set appropriate
memory size.
Below shows how to build Vault Occlum instance.
Step 1. Compile the user program with the Occlum toolchain.
# cd vault_v1.8.9
# occlum-go build -o bin/vault
Step 2. Generate a secure Occlum FS image.
# vi copy.yaml:
11
Technology Guide | Zero Trust - Zero Trust Reference Architecture
includes:
- base.yaml
targets:
- target: /bin
copy:
- files:
- ../bin/vault
- target: /
mkdirs:
- etc/ssl
- target: /etc/ssl
copy:
- from: /etc/ssl/
dirs:
- certs
12
Technology Guide | Zero Trust - Zero Trust Reference Architecture
dev 0000:4b:01.3 {
name vppeth0
}
dev 0000:4b:11.0 {
name vppeth1
}
}
8 Summary
Embracing zero trust is a necessary trend driven by the digital transformation of enterprise IT. Selecting the appropriate
hardware platform (such as 3rd Gen Intel Xeon Scalable processor) and choosing the appropriate software design can reduce
attack surface with strong security posture, increase agility without restrictions imposed by rigid perimeter, and improve control
over services migrated to cloud environment. Building a robust zero trust system is full of challenges. This document
demonstrates ZTRA as a foundational zero trust network access framework and provides best practices to strengthen it with
security offerings from Intel Xeon Scalable processors. The combination of Intel confidential computing feature (Intel SGX) and
Vault provides comprehensive protection for credentials including private key, token, etc. Crypto acceleration with Intel AVX-
512 instructions and Intel QAT further accelerates secure tunnel connections in the zero trust system. These features give
insights on building and upgrading your zero trust systems by maximizing values of Intel technologies.
13
Technology Guide | Zero Trust - Zero Trust Reference Architecture
Vendor Inspur
SGX Yes
Kernel 5.16.0-rc4
CPU Family 6
CPU(s) 128
Socket(s) 2
NUMA Node(s) 2
Turbo enable
14
Technology Guide | Zero Trust - Zero Trust Reference Architecture
Performance varies by use, configuration and other factors. Learn more at www.Intel.com/PerformanceIndex.
Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates. See backup for
configuration details. No product or component can be absolutely secure.
Intel disclaims all express and implied warranties, including without limitation, the implied warranties of merchantability, fitness for a particular
purpose, and non-infringement, as well as any warranty arising from course of performance, course of dealing, or usage in trade.
Intel technologies may require enabled hardware, software or service activation.
Intel does not control or audit third-party data. You should consult other sources to evaluate accuracy.
The products described may contain design defects or errors known as errata which may cause the product to deviate from published
specifications. Current characterized errata are available on request.
© Intel Corporation. Intel, the Intel logo, and other Intel marks are trademarks of Intel Corporation or its subsidiaries. Other names and brands
may be claimed as the property of others.
1122/DN/WIPRO/PDF 751287-001US
15