Cyberthreat Protection - Z-Sync Workshop - Slides
Cyberthreat Protection - Z-Sync Workshop - Slides
Missing Lab Access Information? Reach out in Zoom Chat with your Last Name, First Name and we will respond.
Module Goal
In this module, gain an overview of Zscaler’s Cyber Security and protection capabilities, dive deeper into specific cyber functions, and gain
knowledge on how to configure Zscaler’s cyber security services as they relate to best/common practice.
● Identify the current threat landscape and nature of bad actors and how Zscaler solves these challenges
● Discover how to configure Zscaler products and services to defend against attacks
● Recognize the cyber functions Zscaler has in place to analyze organizational risk and defend against cyber attacks
zzzzz
Internet IaaS/PaaS
Direct Connect
SaaS
ExpressRoute
Connector
Connector
150 DCs Worldwide Zero Control Risk
Trust Exchange
Cyber Threat and Data Protection
Application Peering Data
Center
Verify Identity and Context
IDP
Great User Experience Superior Threat and Data Protection Reduced Cost and Complexity
© 2023 Zscaler, Inc. All rights reserved.
Key differentiator: The world’s largest security cloud
100+ Expert-driven
threat context
ThreatLabz expert Expert
hunters & services
researchers An early warning system for your enterprise ThreatLabz
Better data, better insights, better protection hunters
IPS CSPM/CIEM/IaC
API Integrations
Incident Response /
TLS Decryption (Proxy) Policy Framework Discovery Device Posture • Identity
Platform Workflow
Services • SIEM
Reporting / Logging Risk Score Analytics / UEBA AI/ML Private Service Edge • SOAR
• EDR/MDM
Prevent attackers from discovering or Protect users, servers, applications, and Connect users and devices directly to apps Stop data loss caused by accidental
exploiting apps by making them invisible connected devices no matter where they without ever exposing the network. exposure or malicious exfiltration with the
and only accessible to authorized users or are with full traffic inspection and AI- Misdirect attackers and learn of their most holistic data protection solution that
devices through the Zero Trust Exchange. powered security at the edge. presence with proactive lures and decoys. spans managed and unmanaged devices,
servers, public cloud, and cloud apps.
ZIA Forward SSL Proxy (MITM) - traffic going to ZPA Reverse Proxy (SSL Termination) - traffic
the Internet going to private applications
© 2023 Zscaler, Inc. All rights reserved.
Certificate Chain with SSL Inspection
Zscaler Root CA Zscaler root CA (pre-installed on clients) Zscaler Offline Key Store
Zscaler Intermediate Root CA (zscalertwo.net)
Zscaler Issuing CA (zscalertwo.net) (t)
Zscaler Central Authority
Zscaler’s Intermediate CA
DB
• Virus
• PUA
• Trojan
• Worm
• Ransomware
• Adware / Spyware
• File Reputation
• Active Content
• Undetectable
• Unscannable
Downloading dangerous content via the browser (ex. exploit Vulnerabilities in web server applications allowing malicious
kits, malicious adware) or vulnerable ActiveX controls without users to inject their code into the site.
user knowledge.
5 min.
37
20 min.
• Task 1: Review SSL Inspection Policy & Verify SSL Decryption
• Task 2: Review Threat Protection Configurations & Risk Reports
• Task 3: Check Your Security Posture
38
ALLOW BLOCK
Cyber Threat
Protection Safe Pixel Streaming
Managed BYOD/Unmanaged
Endpoints Endpoints
Employees Employees, Third-party
Isolate NRDs,
Misc &
Unknown
Destinations
Isolate
risky internet
content
(Maintain
Security Posture
while
1-Click
Maintaining User
AI-Powered
Productivity) Smart Isolation
Of Suspicious sites
Define granular
Isolation of policies based on user
High-value group – execs, human
users resources, accounting,
IP holders etc
Dynamically
Mitigate Business
Risk (Isolation Risky
Users and
devices) User Risk Isolate internet traffic
and Device based on user’s risk
Posture score or device
posture.
based
Isolation
. industries
Highly regulated
follow the whitelisting approach
Manage security
or have extremely restrictive
Exception exceptions via
internet access.
Management isolation instead of
via Isolation allowing traffic
directly.
• Task 1: Test Browser Isolation User Experience & Threat Prevention Capabilities
• Task 2: Review Browser Isolation Configuration & Settings
55
Specialization
eLearning + Lab + Exam eLearning + Lab + Exam eLearning + Lab + Exam eLearning + Lab + Exam
ONLINE - 5+4+1 HRS ONLINE - 5+4+1 HRS ONLINE - 2+1+0.5 HRS ONLINE - 5+4+1 HRS
Check hash against Scan sample using Sample is sent through Once a verdict is
blacklists from threat feeds engines optimized to detection pipeline in the determined, threat
and other observed identify known bad such sandbox database is updated for the
samples in the cloud as AV/Yara/ML Cloud Effect and policy
enforcement occurs
AI/ML
• Scan everything
▪ ALL File Types
▪ First-Time Action: Quarantine + Turn on AI Quarantine
switch
Malware Severity
MITRE ATT&CK
Process Graph
Analysis Screenshots
Automated Mapping
Automated MITRE ATT&CK
technique mapping from observed
behaviors
15 min.
• Task 1: Review Sandbox Configuration
• Task 2: View Sandbox Activity Report
73
• Key benefits:
1.86B+ Total websites on the • Define Acceptable Use Policy
Internet for your users
• Block inappropriate or high
risk URL categories
• Increases employee
New domain names productivity
120,000
register every day • Network bandwidth efficiency
• Minimizes company liability
15 min.
• Task 1: View Content Filtering Controls
• Task 2: Test End User Experience with Content Filtering
85
1s of incidents to remediate
Containment takes weeks
Castle and Moat State Zero Trust State Zero Trust + Deception State
Limited visibility. Multiple attack paths. Connect users directly to apps and Create false attack paths. Detect lateral
Several opportunities for lateral movement. services. Minimize attack paths. movement. Derail attacks.
TARGET
???
Attackers know your strategy. Decoys and traps make your environment
Predictable defenses are easily bypassed unpredictable, disrupt attacker playbooks
Privilege Lateral
Escalation Movement
15 min.
• Task 1: Review the Zscaler Deception Administrator Console
92