The three foundational Pillars are:
1. Zero Trust Platform
2. Security Automation and Orchestration
3. Security Visibility and Analytics
These Zero Trust Foundational Pillars work great whether you leverage the CIS 20, NIST 800, or the ISO 27000 family cybersecurity frameworks. A few key things you need for all of them include:
◈ Segmentation, Priviledge Escalation Monitoring, and Multi Factor Authentication
◈ Inventory of your hardware and software plus application flows
◈ What are your key risks (threats, brand image, fines, and compliance)
◈ Understand what your top 50 pieces of sensitive data are
◈ Understand where your top 50 pieces of sensitive data presently resides
◈ Who is after this information? What are their capabilities
- Zero Trust Platform
- Data security, which is ultimately a technology solution
- Managing the data, categorizing and developing data classification schemas, and encrypting data both at rest and in transit
- Security Automation, Orchestration Security, and Risk leadership to leverage and use tools and technologies that enable automation and orchestration across the enterprise.
- The ability to have positive command and control of the many components that are used as part of the Zero Trust strategy.
- Security Visibility and Analytics
- You can’t combat a threat you can’t see or understand. Tools such as traditional security information management (SIM), more-advanced security analytics platforms, security user behavior analytics (SUBA), and other analytics systems enable security professionals to know and comprehend what’s taking place in the network.
- This focus area of the extended Zero Trust ecosystem helps with the ability of a tool, platform, or system to empower the security analyst to accurately observe threats that are present and orient defenses more intelligently.
Be sure to take into consideration the Core principles that make up Zero Trust:
1. Identify and Catalog your Sensitive Data
2. Map the data flows of your sensitive data
3. Architect your Zero Trust network
4. Create your automated rule base
5. Continuously monitor your trusted ecosystem
We have the product and services experience to help you determine a practical systems approach to Zero Trust Reach out to your Cisco Security Services team so we can help guide your through this.
0 comments:
Post a Comment