Gartner - Zero Trust Networking As An Initial Step
Gartner - Zero Trust Networking As An Initial Step
© 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form
without Gartner's prior written permission. It consists of the opinions of Gartner's research organization, which should not be construed as statements of fact. While the information contained in this
publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research
may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are
governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or
influence from any third party. For further information, see "Guiding Principles on Independence and Objectivity."
Zero Trust Is Misnamed
1 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Zero Trust Is Misnamed
3 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Zero Trust Is Being Abused as
a Marketing Term.
5 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
What Is CARTA and
Why Is It Important?
6 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Our World View Is Flawed
Zero days
Targeted attacks
Everything needs to be continuously assessed
Hostile content
and for security decisions adapt accordingly
7 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Continuous
Adaptive
CARTA Risk and
Trust
Assessment
8 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
carta, charta, cartae
noun
9 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Complete Protection = Blocking/Prevention and
Detection/Response
10 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
CARTA Is the Engine That Powers the Gartner
Adaptive Security Architecture
Policy
Adjust Implement
posture posture
Predict Prevent
Continuous
Risk/Trust
Assessment
Adjust posture Monitor posture
Users
Systems
System activity
Payload
Network
Respond Detect
11
Compliance
© 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
CARTA Is the Engine That Powers the Gartner
Adaptive Security Architecture
Policy
Adjust Implement
posture posture
Predict Prevent
Risk-prioritized
Harden systems
exposure assessment
Investigate incidents/
Retrospective analysis Contain incidents
Respond Detect
12
Compliance
© 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
CARTA Is the Engine That Powers the Gartner
Adaptive Security Architecture
CARTA-inspired Vulnerability Management Policy
Breach/Attach Simulation Adjust Implement
posture posture
Predict Prevent
Risk-prioritized
Harden systems
exposure assessment
Investigate incidents/
Retrospective analysis Contain incidents
Respond Detect
SOAR Compliance
EDR, NTA, xDR
13 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. ED
What About Access Protection?
Discover and
Enable Access
14 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
CARTA Is the Engine That Powers the Gartner
Adaptive Security Architecture
Policy
Adjust Implement
posture posture
Discover requirements Adaptive access
Assess risk and compliance Context and credential assessment
h
Discover new requirements Entity/Service/Data adaptation
Continuous
Baseline known Risk/Trust
Assessment Access
usage and entitlements
Adjust posture Users Monitor posture
Devices
Assess risk/Test policy Apps
Monitor usage compliance
change Actions
Data
Analyze, manage and report usage Access Detect exceptions; prioritize risk
Compliance
15 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
CARTA Is the Engine That Powers the Gartner
Adaptive Security Architecture
CASB cloud application discovery Policy
CSPM cloud security posture mgmt Adjust Implement
posture posture
Discover requirements Adaptive access
Assess risk and compliance Context and credential assessment
h
Discover new requirements Entity/Service/Data adaptation
Continuous
Baseline known Risk/Trust
Assessment Access
usage and entitlements
Adjust posture Users Monitor posture
Devices
Assess risk/Test policy Apps
Monitor usage compliance
change Actions
Data
Analyze, manage and report usage Access Detect exceptions; prioritize risk
17 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
First, What Is Trust?
18 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Key Points on Trust
19 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
What Is Zero Trust Networking?
20 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Key Points on Zero Trust Networking
21 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
How Does Zero Trust
Networking Map to
CARTA and What
Projects Can I
Implement to Adopt
the Zero Trust
Networking Concept?
22 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Back to the Basics. Zero Trust Networking Is a
Solid Preventative Control
Zero Trust Network Segmentation
Policy
aka Microsegmentation
Adjust Implement
posture posture
Predict Prevent
Risk-prioritized
Harden systems
exposure assessment
Investigate incidents/
Retrospective analysis Contain incidents
Respond Detect
23
Compliance
© 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. ED
Submarines Assume Breaches, Why Not Data
Centers? Zero Trust Network Segmentation
(Microsegmentation)
Providing East/West Traffic Segmentation and Visibility.
24 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Zero Trust Network Segmentation and Flow
Visibility Project (Microsegmentation)
Sample vendor list:
When to consider:
Enterprises with flat network topologies (on- SDN/external:
• VMware • Cisco (Tetration)
premises AND IaaS) wanting visibility and • CloudPassage
• Cisco (ACI/ISE)
control of east/west network traffic flows • Cloudvisory
• Juniper Networks
between workloads, with a goal of thwarting • vArmour • Edgewise
the lateral spread of attacks that have gained • ShieldX • Illumio
a foothold in their data center. Host/container: • Neuvector
• Alcide • Tigera
• Aporeto • Twistlock
• Aqua Security
Criteria Advice
• Agents, virtual appliance or container-based? • Make visibility the starting point for segmentation.
• If agent-based, performance impact? • Don't oversegment. Start with critical applications.
• If virtual-appliance-based, how to get in line? • Require vendors to support native segmentation
• Will this solution work for public cloud IaaS? capabilities of IaaS, firewalls, switches, etc.
25 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Back to the Basics. Zero Trust Networking Is a
Solid Preventative Control
Zero Trust Network Access
Policy
aka Software Defined Perimeter
Adjust Implement
posture posture
Discover Requirements Adaptive Access
Assess risk and compliance Context and credential assessment
h
Discover new requirements Entity/Service/Data adaptation
Continuous
Baseline known Risk/Trust
Assessment Access
usage and entitlements
Adjust posture Users Monitor posture
Devices
Assess risk/Test policy Apps
Monitor usage compliance
change Actions
Data
Analyze, manage and report usage Access Detect exceptions; prioritize risk
Compliance
26 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Zero Trust Network Access Project
(Software-Defined Perimeter)
Precise, application and context-aware access to enterprise applications
Criteria Advice
• Windows, Mac, Linux and which mobile OSs? • Reduce services in enterprise DMZs if possible
• Trust broker in-line entire session? Or just setup? • Re-evaluate risk of legacy VPN-based access
• Cloud-based as a service, on-premises or both? • Pilot a deployment in 2019 using a digital
• Support for workloads and users in IaaS business service linked to partners as a use case
28 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Strategic Planning Assumption
By 2022, 80% of new digital business applications opened up to ecosystem
partners will be accessed with a Zero Trust Network Access offering.
29 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
If We Just Implement Another Siloed Preventative
Control, We Will Fail Zero Trust Network Segmentation
Policy
aka Microsegmentation
Adjust Implement
posture posture
Predict Prevent
Risk-prioritized
Harden systems
exposure assessment
Investigate incidents/
Retrospective analysis Contain incidents
Respond Detect
Monitor flows and behaviors once
30
Compliance
© 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. ED connected.
If We Just Implement Another Siloed Preventative
Control, We Will Fail Zero Trust Network Access
Policy
aka Software Defined Perimeter
Adjust Implement
posture posture
Discover Requirements Adaptive Access
Assess risk and compliance Context and credential assessment
h
Discover new requirements Entity/Service/Data adaptation
Continuous
Baseline known Visibility and
Assessment Access
usage and entitlements
Adjust posture Users Monitor posture
Devices
Assess risk/Test policy Apps Monitor usage compliance
change Actions
Data
Analyze, manage and report usage Detect exceptions; prioritize risk
Access
Investigate and respond
Contain/Mitigate risk
to exceptions
Manage Usage Verify Usage
Monitor actions/interactions and
Compliance
31 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. data handling once connected
What Other Security
Projects Would Help
to Reduce Excessive
Implicit Trust?
32 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
What Other Areas in My Infrastructure Have
Excessive Implicit Risk to Target?
• End user workstations. Remove admin rights.
• IT admin accounts. Use privilege access management.
• Servers and workloads. Apply default deny/app control.
• Browser. Remotely render any uncategorized site.
• Email. Remotely render any embedded link.
• DevOps. Embrace open source, but know the identity, provenance
and vulnerabilities of every component used.
• DevOps. Don’t allow a workload to be instantiated in production
unless you know its identity and provenance.
33 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Recommendations
Ignore vendor hype on “Zero Trust”. What exactly does the vendor do?
Find the noun … Zero Trust <______> and how the vendor’s offering
supports adaptive risk/trust decision making.
“Zero Trust” doesn’t resonate with business leaders. Talk about
continuously assessed risk and trust that can adapt to the changing
context and adapt to the risk tolerance levels of business leaders,
enabling new digital business, cloud and mobile initiatives.
Budget and pilot two Zero Trust networking projects in 2019 — Zero Trust
network segmentation and Zero Trust network access.
Use CARTA to identify projects outside of Zero Trust networking where
excessive trust creates latent risk and where your security posture can be
significantly improved by risk-optimizing the trust.
34 © 2019 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates.
Recommended Gartner Research