| 10 de giugno de 2020

Building A Zero Trust Visibility Architecture

The concept is a departure from perimeter-based cybersecurity as the focus shifts toward individual access

Autore: Harry Berridge, Director of Federal Operations at Garland Technology

Condividi    

In response to rapidly evolving cybersecurity threats, Zero Trust, a concept that emerged over 15 years ago, is now a strategic priority for government network agencies. Following reports from the Defense Innovation Board (DIB) and the American Council for Technology - Industry Advisory Council, the federal government is now putting Zero Trust at the forefront of its increased cybersecurity spending.

What is Zero Trust (ZT) exactly? The concept is a departure from perimeter-based cybersecurity as the focus shifts toward individual access and away from protecting wide segments of the network. By narrowing the scope of network defenses, and increasing protection for resources as they span across an increasingly distributed network. Sounds easy enough, right? While there are many facets of implementing a Zero Trust strategy, this blog will review a few main architecture concepts, including ZT Network Requirements, ZT Framework, and ZT Visibility fabric.

Top 10 Zero Trust Network Requirements

In a Zero Trust environment, all traffic must be inspected and logged on the network and analyzed to identify and react to potential attacks. When building a Zero Trust Architecture, additional network requirements include:

  1. Have basic network connectivity. The local area network (LAN), enterprise controlled or not, provides basic routing and infrastructure (e.g., DNS).
  2. Must be able to distinguish between what assets are owned or managed by the enterprise and their current security posture.
  3. Must capture all network traffic - recording packets seen on the data plane, and can filter out metadata about the connection if needed, to dynamically update policies.
  4. Resources should not be reachable without accessing a Policy Enforcement Point (PEP).
  5. The data plane, or application data traffic and control plane, which is the policy engine, policy administrator, and PEPs are logically separate.
  6. Users must be able to access the PEP component to gain access to resources. This could take the form of a web portal, network device, or software agent that enables the connection.
  7. The PEP is the only component that accesses the policy administrator to establish communication paths from clients to resources. All business process traffic passes through one or more PEPs.
  8. Remote assets should be able to access resources without needing to link back to the enterprise network (i.e., virtual private network [VPN]) to access services utilized by the enterprise and hosted by a public cloud provider (e.g., email).
  9. Zero Trust Architecture infrastructure used to support access decisions should be made scalable to account for changes in process load. 
  10. Assets may not be able to reach certain PEPs due to observable factors, possibly based on location (geolocation or network location), device type, or other criteria.

Zero Trust Framework

After understanding the network requirements for a Zero Trust environment, start mapping out the various components on the network. The National Institute of Standards and Technology (NIST)’s logical framework model focuses on how the policy engine, policy administrator, and policy enforcement communicates with each other.

The policy engine lets a user access each resource, with the decision based on enterprise policies. The policy administrator connects to the policy engine, once the policy engine determines whether the user is allowed to access a resource, and whether to execute and create the authentication credential needed. The policy enforcement point handles the connections between users and resources. Its job is to monitor and determine the continued access between the two.

This framework also lays out how complementary components are integrated, including a Continuous diagnostics and mitigation system, Industry compliance system, Threat intelligence feed, Data access policies, Enterprise public key infrastructure, ID management system, Security information, and event management (SIEM) system and Network and system activity logs.

Zero Trust Visibility Fabric

Within this framework, “Network and system activity logs” represent an enterprise system that aggregates asset logs, network traffic, resource access actions, and other events that provide real-time (or near-real-time) feedback on the security posture of enterprise information systems.

While every government agency network will require a unique design to meet specific needs, any Zero Trust Architecture needs a visibility fabric to capture all network traffic. 

When you implement a visibility infrastructure that leverages network TAPs and network packet brokers (NPB) that ultimately feeds data to your network monitoring and security solutions, you’re able to maximize the effectiveness of Zero Trust through:

  • Improved Risk Assessment: Being able to guarantee total visibility into your network traffic and data flows makes it easier to spot vulnerabilities and manage changes to the protect surface.
  • Reduced Network Complexity: Network TAPs and NPBs make it easier to maximize tool utilization through load balancing, packet filtering, and other features. These features minimize the number of tools you need to deploy to maximize visibility, reducing complexity in sprawling government networks.
  • Streamlined Infrastructure Upgrades: A visibility layer creates more access points to your network and an ability to implement inline or out-of-band security and monitoring tools. Instead of taking the network down for extended periods of time to upgrade infrastructure components, you can maintain data flows while making changes to the architecture.
  • Better Tool Performance: The only way for your security and monitoring tools to deliver the best results is for them to see every necessary packet of traffic. Your network visibility layer ensures each tool is fed with every bit of data it needs to support Zero Trust.
  • Greater Scalability: Over time, government networks will need to increase speeds to keep pace with modern use cases. A proper visibility layer makes it easier to plan bandwidth increases and demands for greater traffic support.
  • Fewer Compliance Violations: Compliance violations occur because of blind spots in government networks. When your monitoring and security tools can see all data packets, you can stay ahead of problems that would otherwise build until your network was out of compliance.


Each of these benefits can be built into a Zero Trust Architecture if you leverage the right tools. To build a visibility fabric that supports the most effective Zero Trust Architecture, you need to design the right combination of network TAPs, network packet brokers (NPBs), bypass TAPs, and cloud visibility solutions.

Taking steps toward Zero Trust starts with implementing a Zero Trust Visibility Architecture, by guaranteeing total network visibility that meets the highest government cybersecurity maturity levels. 

Garland Technology is here to help you succeed on the path to Zero Trust. Their full portfolio of network TAPs, network packet brokers, bypass technology, and cloud  visibility solutions will simplify your cybersecurity upgrades. 

You can read this article in Garland Technology website


sui nostri social network