Autore: Harry Berridge, Director of Federal Operations at Garland Technology
In response to rapidly evolving cybersecurity threats, Zero Trust, a concept that emerged over 15 years ago, is now a strategic priority for government network agencies. Following reports from the Defense Innovation Board (DIB) and the American Council for Technology - Industry Advisory Council, the federal government is now putting Zero Trust at the forefront of its increased cybersecurity spending.
What is Zero Trust (ZT) exactly? The concept is a departure from perimeter-based cybersecurity as the focus shifts toward individual access and away from protecting wide segments of the network. By narrowing the scope of network defenses, and increasing protection for resources as they span across an increasingly distributed network. Sounds easy enough, right? While there are many facets of implementing a Zero Trust strategy, this blog will review a few main architecture concepts, including ZT Network Requirements, ZT Framework, and ZT Visibility fabric.
In a Zero Trust environment, all traffic must be inspected and logged on the network and analyzed to identify and react to potential attacks. When building a Zero Trust Architecture, additional network requirements include:
After understanding the network requirements for a Zero Trust environment, start mapping out the various components on the network. The National Institute of Standards and Technology (NIST)’s logical framework model focuses on how the policy engine, policy administrator, and policy enforcement communicates with each other.
The policy engine lets a user access each resource, with the decision based on enterprise policies. The policy administrator connects to the policy engine, once the policy engine determines whether the user is allowed to access a resource, and whether to execute and create the authentication credential needed. The policy enforcement point handles the connections between users and resources. Its job is to monitor and determine the continued access between the two.
This framework also lays out how complementary components are integrated, including a Continuous diagnostics and mitigation system, Industry compliance system, Threat intelligence feed, Data access policies, Enterprise public key infrastructure, ID management system, Security information, and event management (SIEM) system and Network and system activity logs.
Within this framework, “Network and system activity logs” represent an enterprise system that aggregates asset logs, network traffic, resource access actions, and other events that provide real-time (or near-real-time) feedback on the security posture of enterprise information systems.
While every government agency network will require a unique design to meet specific needs, any Zero Trust Architecture needs a visibility fabric to capture all network traffic.
When you implement a visibility infrastructure that leverages network TAPs and network packet brokers (NPB) that ultimately feeds data to your network monitoring and security solutions, you’re able to maximize the effectiveness of Zero Trust through:
Each of these benefits can be built into a Zero Trust Architecture if you leverage the right tools. To build a visibility fabric that supports the most effective Zero Trust Architecture, you need to design the right combination of network TAPs, network packet brokers (NPBs), bypass TAPs, and cloud visibility solutions.
Taking steps toward Zero Trust starts with implementing a Zero Trust Visibility Architecture, by guaranteeing total network visibility that meets the highest government cybersecurity maturity levels.
Garland Technology is here to help you succeed on the path to Zero Trust. Their full portfolio of network TAPs, network packet brokers, bypass technology, and cloud visibility solutions will simplify your cybersecurity upgrades.
You can read this article in Garland Technology website.