Zero trust methodology

advertisement
Zero Trust
Methodology in the
Network
Name: Suraj Kumar
Designation: XXXXX
Date: 2nd Aug 2023
Introduction
Zero Trust is a cybersecurity
approach that challenges the
traditional perimeter-based security
model.
It assumes that nothing inside or
outside the network should be
trusted implicitly.
Every user, device, application, or
network component must be
continuously verified and
authenticated before gaining access
to resources.
The core principles of Zero Trust
include "never trust, always verify,"
least privilege access, microsegmentation, and real-time
monitoring.
The Six
Pillars of
Zero Trust
Model
What: A security strategy
based on “least-privilege”
to address the modern
“perimeter-less” IT
environment
Intent: Assumes all
environments are hostile no access until proven
trusted
Tenants: All users,
devices, applications,
data, and network flows
encrypted, authenticated
and authorized
Enablement: Visibility
and automation systems
are what allow a zerotrust network to be built
and operated
Adaptable to: All
environments
Missing: Threats
A more secure architecture
A focus on safer data
Benefits
Improved protection against existing and evolving
threats
Reduced impact from breaches
Improved compliance and visibility
Potential cost reduction
Key Considerations
Zero Trust is not a bolt-on
security product – must be
designed into the network
Provide total visibility and
analytics across the entire
network
Ensure granular network
segmentation by user,
device and application
Must authenticate
before being allowed
to connect to any
asset on the network
Continuously
monitor/inspect/log
all traffic, assess
threat and automate
responses
Adopt a leastprivileged strategy –
only grant access to
needed resources to
perform their job
Assume all traffic,
regardless of location,
is a potential threat
Detect and respond
to anomalous activity
in real-time
No implicit trust
Shear volume makes
automation critical – to
manage access and respond
to security threats
Open, extensible
Foundational platform that
works with existing
investments
Optimize risk management
through real-time response
to dynamic threats
Trust Logical Components
from NIST SP-800-207
Assessment and Planning
Identify Zero Trust Pilot Area
Create a Zero Trust Policy
User Identity Management
Device Verification and Management
Zero Trust
Implementatio
n Plan
Micro-Segmentation
Network Visibility and Monitoring
Continuous Authentication and Authorization
Data Protection and Encryption
Security Training and Awareness
Testing and Validation
Gradual Expansion
Continuous Improvement
Audit and Compliance
Collaboration and Communication
Month 1: Conduct initial network security assessment and identify potential vulnerabilities.
Month 2: Define the Zero Trust policy, scope, and objectives for the implementation.
Month 3: Begin the pilot deployment of Zero Trust measures in a specific department or application.
Month 4: Strengthen user identity and access management with MFA and SSO solutions.
Month 5: Implement device verification and security measures for all devices seeking network access.
Month 6: Segment the network and apply strict access controls between segments.
Month 7: Introduce data protection and encryption protocols to safeguard sensitive information.
Timeline
Month 8: Deploy advanced monitoring tools and behavior analytics for continuous network monitoring.
Month 9: Extend Zero Trust principles to cloud services and remote access scenarios.
Month 10: Conduct cybersecurity training for employees and users to raise awareness of Zero Trust.
Month 11: Gradually expand Zero Trust to cover more areas of the network based on pilot feedback.
Month 12: Review the implementation, analyze incidents, and make necessary adjustments.
Month 13: Conduct a compliance audit to ensure alignment with internal policies and regulations.
Month 14: Provide continuous maintenance and support for the Zero Trust infrastructure.
Month 15: Achieve full network Zero Trust implementation across all relevant areas.
Dependency
• Dependencies in the context of
implementing Zero Trust in an organization's
network refer to the interrelated factors and
prerequisites that must be in place for the
successful adoption and operation of the Zero
Trust security framework.
Team involvement
•
IT and Security Team
•
Network Architects
•
Cybersecurity Specialists
•
Identity and Access Management (IAM) Experts
•
Endpoint Security Experts
•
Cloud and Remote Access Teams
•
Compliance Officers
•
Training and Awareness Specialists
•
Project Manager
•
Executive Sponsorship
•
Third-Party Consultants
Zero Trust
Component
s
Comprehensive cybersecurity framework
that involves several key components like
IAM, Data protection, Encryption etc.
working together to enhance security and
protect an organization's network and
data.
Risk
Assessmen
t and
Mitigation
RISK ASSESSMENT AND MITIGATION ARE CRUCIAL
COMPONENTS OF IMPLEMENTING ZERO TRUST IN AN
ORGANIZATION'S NETWORK.
THEY INVOLVE IDENTIFYING POTENTIAL SECURITY RISKS
AND VULNERABILITIES, EVALUATING THEIR POTENTIAL
IMPACT, AND TAKING PROACTIVE MEASURES TO MINIMIZE
OR ELIMINATE THOSE RISKS.
Zero Trust
Readines
s
Zero Trust readiness refers to the state of
MAF’s preparedness to adopt and
implement the Zero Trust security
framework effectively.
Before embarking on a Zero Trust
journey, it's essential to assess the MAF’s
current capabilities, infrastructure, and
security practices to determine if it is
ready for a Zero Trust approach.
Monitoring and Evaluation
Monitoring and evaluation are critical components of the Zero Trust implementation
process. They involve ongoing assessment, measurement, and analysis of the
effectiveness and performance of the Zero Trust security framework.
Throughout this presentation, we explored the
concept of Zero Trust and its importance in the
current cybersecurity landscape.
Conclusio
n
We highlighted the need for a more robust security
approach, especially as cyber threats become more
sophisticated and breaches more common.
Zero Trust ensures that security measures are applied
consistently across the network, user identities are
continuously verified, and access controls are strictly
enforced, significantly reducing the attack surface.
Questions
and
Answers
Thank You
Download