Zero Trust Security Model and Implementation - In…
Zero Trust Security Model and Implementation - In…
Zero Trust
Security Model
and
Implementation
No Default Trust
Compartmentalize
Improved Effectiveness
Greater Efficiency
Improved Ability
Adopt a least
privilege strategy
and strictly enforce
access control. The
goal is to minimize
allowed access to
resources to reduce
Enforce the pathways
Access available for
Control malware and
attackers to gain
unauthorized
access.
This principle
reiterates the need
to “always verify”
while also
reinforcing that
adequate protection
requires more than
just strict
enforcement of
access control.
Close and
continuous
Inspect
attention must also
and Log
be given to exactly
All Traffic
what “allowed”
applications are
actually doing, and
the only way to
accomplish these
goals is to inspect
the content for
threats.
Secure
Control
Monitor
Conceptual Architecture
Management Infrastructure
Centralized management
capabilities are crucial to enabling
efficient administration and ongoing
monitoring, particularly for
implementations involving multiple
distributed Zero Trust segmentation
platforms. A data acquisition
network also provides a convenient
way to supplement the native
monitoring and analysis capabilities
for a Zero Trust segmentation
platform. Session logs that have
been forwarded to a data
acquisition network can then be
processed by out-of-band analysis
tools and technologies intended, for
example, to enhance network
visibility, detect unknown threats,
or support compliance reporting.
Trust Zones
To get started,
security teams can
configure a Zero
Trust segmentation
platform in listen-
only mode to obtain
a detailed picture of
traffic flows
Configure
throughout the
Listen-
network, including
Only
where, when, and to
Mode
what extent specific
users are using
specific applications
and data resources.
With a detailed
understanding of the
network traffic
flows in the
environment, the
next step is to
define trust zones
and incrementally
establish trust
boundaries based
on relative risk or
sensitivity of the
data involved.
Security teams
Define should deploy
Zero devices in
Trust appropriate
Zones locations to
establish internal
trust boundaries for
defined trust zones.
Then, they should
configure
enforcement and
inspection policies
to effectively put
each trust boundary
“online.”
Zero Trust
principles and
concepts must be
implemented at
major access
points to the
internet. Security
teams will have to
replace or augment
legacy network
Implement security devices
at Major with a Zero Trust
Access segmentation
Points platform at this
deployment stage
to gain the
capabilities and
benefits of a Zero
Trust security
model.
3 of 3