Zero Trust Strategy PDF

Document Details

CooperativeJacksonville

Uploaded by CooperativeJacksonville

Nanyang Technological University

2024

Tags

zero trust cloud security cybersecurity strategy

Summary

This document is a study guide for a Zero Trust training course. It provides an overview of Zero Trust principles and practices. It also covers organizational strategy, IT strategy, and tactics.

Full Transcript

The official location for SDP and Zero Trust Working Group is https://cloudsecurityalliance.org/research/working-groups/zero-trust/ Disclaimer Cloud Security Alliance designed and created this Zero Trust Training course study guide (the “Work”) primarily as an educational resource for security an...

The official location for SDP and Zero Trust Working Group is https://cloudsecurityalliance.org/research/working-groups/zero-trust/ Disclaimer Cloud Security Alliance designed and created this Zero Trust Training course study guide (the “Work”) primarily as an educational resource for security and governance professionals. Cloud Security Alliance makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, professionals should apply their own professional judgment to the specific circumstances presented by the particular systems or information technology environment. Version Number: 20240314 © 2024 Cloud Security Alliance – All Rights Reserved. You may download, store, display on your computer, view, print, and link to the Cloud Security Alliance at https://cloudsecurityalliance.org subject to the following: (a) the draft may be used solely for your personal, informational, noncommercial use; (b) the draft may not be modified or altered in any way; (c) the draft may not be redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote portions of the draft as permitted by the Fair Use provisions of the United States Copyright Act, provided that you attribute the portions to the Cloud Security Alliance. © Copyright 2024, Cloud Security Alliance. All rights reserved. ii About Cloud Security Alliance The Cloud Security AllianceSM (CSA) (www.cloudsecurityalliance.org) is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. Cloud Security Alliance harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. Cloud Security Alliance activities, knowledge and extensive network benefit the entire community impacted by cloud—from providers and customers, to governments, entrepreneurs and the assurance industry— and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem. CSA Address 709 Dupont St. Bellingham, WA 98225, USA Phone: +1.360.746.2689 Fax: +1.206.832.3513 Contact us: [email protected] Website: https://cloudsecurityalliance.org/ Zero Trust Training Page: https://knowledge.cloudsecurityalliance.org/page/zero-trust-training Zero Trust Advancement Center: https://cloudsecurityalliance.org/zt/ Provide Feedback: [email protected] CSA Circle Online Community: https://circle.cloudsecurityalliance.org/ Twitter: https://twitter.com/cloudsa LinkedIn: www.linkedin.com/company/cloud/security/alliance Facebook: www.facebook.com/csacloudfiles CSA CloudBytes Channel: http://www.csacloudbytes.com/ CSA Research Channel: https://www.brighttalk.com/channel/16947/ CSA Youtube Channel: https://csaurl.org/youtube CSA Blog: https://cloudsecurityalliance.org/blog/ © Copyright 2024, Cloud Security Alliance. All rights reserved. iii Acknowledgments Dedicated to Juanita Koilpillai, a pioneer in software-defined perimeters whose contributions to the Zero Trust Architecture Training and CSA are immeasurable. The Zero Trust Training was developed with the support of the Cloud Security Alliance Zero Trust Training (ZTT) Expert Group, whose members include volunteers from a wide variety of industries across the globe. Made up of subject matter experts with hands-on experience planning and implementing ZTT, both as cloud service consumers and providers, the ZTT Expert Group includes board members, the technical C-suite, as well as privacy, legal, internal audit, procurement, IT, security and development teams. From cumulative stakeholder input, the ZTT Expert Group established the value proposition, scope, learning objectives, and curriculum of the Zero Trust Training. To learn more about the Zero Trust Training and ways to get involved please visit: https:// cloudsecurityalliance.org/zt/ We would also like to thank our beta testers, who provided valuable feedback on the Zero Trust Training. © Copyright 2024, Cloud Security Alliance. All rights reserved. iv Lead Developers: Heinrich Smit, CISO & Risk Management, Semperis, USA John Kindervag, Senior Vice President, Cybersecurity Strategy, ON2IT Cybersecurity Michael Roza, Head of Risk, Audit, Control and Compliance Paul Simmonds, Chief Executive Officer, Global Identity Foundation Prasad T, Head - Information Security, Verse Innovation Shruti Kulkarni, Cyber Security Architect & PhD Student, 6point6 Contributing Editors: Jason Garbis, Founder and Principal, Numberline Security Mark Schlicting, Information Security Architect, BPM Richard Lee, Consultant/Principal, MITRE Roland Kissoon, Senior Specialist - Cyber Security, Microsoft Expert Reviewer: Chase Cunningham, Speaker, Podcaster, Author, Dr. Zero Trust Hannah Day, Principal Cloud Security Architect, Mayo Clinic Jaye Tilson, Director of Strategy, Axis Security Jonathan Flack, Principal Architect, Cloud & Security Architecture, Under contract to the Department of the Air Force Matt Lee, Senior Director of Security and Compliance Pax8 Dr. Matt Meersman, Principal CyberSecurity Engineer & PhD Student, MITRE Dr. Ron Martin, Professor, Capitol Technology University CSA Staff: Adriano Sverko, Technical Writer, Cloud Security Alliance Andy Ruth, Content Developer, Cloud Security Alliance Anna Campbell Schorr, Training Program Manager, Cloud Security Alliance Chandler Curran, Training Project Manager, Cloud Security Alliance Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance Erik Johnson, Senior Research Analyst, Cloud Security Alliance Hannah Rock, Content Development Manager, Cloud Security Alliance Judy Bagwell, Training Project Manager, Cloud Security Alliance Stephen Smith, Senior Graphic Designer, Cloud Security Alliance © Copyright 2024, Cloud Security Alliance. All rights reserved. v Table of Contents About Cloud Security Alliance iii Acknowledgments iv List of Figures viii Course Intro 1 Course Structure 1 Course Learning Objectives 1 1 Levels of Strategy 2 1.1 Organizational Strategy - The Ultimate Goal 6 1.2 Cybersecurity Strategy - Zero Trust 6 1.2.1 Key Tenets of Zero Trust 6 1.2.2 Strategic Alignment & Operational Integration 7 1.3 IT Strategy & Technology 7 1.4 Tactics 8 1.5 Operations 9 2 Zero Trust Drivers & Buy-In 10 2.1 The Value of Zero Trust 10 2.2 Risk Management as a Driver 11 2.2.1 Board-Level Risk Management & Zero Trust Alignment 11 2.2.2 Evolving Threat & Risk Landscape 12 2.3 Create a Case for Zero Trust 12 2.4 Leadership Buy-In 12 3 Tactics for Zero Trust 14 3.1 Zero Trust Design Principles 14 3.1.1 Focus on Business Outcomes 15 3.1.2 Design from the Inside Out 15 3.1.3 Determine Who & What Needs Access 16 3.1.4 Inspect & Log Traffic 17 3.2 Zero Trust Maturity Model 18 3.2.1 Zero Trust Maturity Model in Practice 19 3.2.2 CISA-Based Maturity Model 20 3.3 The Five Steps for Zero Trust Implementation 21 3.3.1 Step 1: Define Your Protect Surface(s) 21 3.3.2 Step 2: Map & Prioritize the Transaction Flows 22 © Copyright 2024, Cloud Security Alliance. All rights reserved. vi 3.3.3 Step 3: Build a Zero Trust Architecture 23 3.3.4 Step 4: Create Zero Trust Policy 24 3.3.5 Step 5: Monitor & Maintain the Network 24 4 Zero Trust & Operations 25 4.1 Cultural & Organizational Shift 26 4.2 Training & Education 26 4.3 Regulatory & Compliance Shift 26 4.3.1 Regional Regulations 27 4.4 Legacy Systems & Infrastructure 27 4.5 Usability & Friction 28 4.5.1 User Experience 28 4.5.2 Site Reliability Engineering 28 4.5.2.1 Monitoring & Understanding System Compromises 28 4.5.2.2 Resource & Component Management 29 Conclusion 30 Glossary 30 Acronym List 31 © Copyright 2024, Cloud Security Alliance. All rights reserved. vii List of Figures Figure 1: Strategy Perspective of a Standard Org. Chart 2 Figure 2: Example of Roles and Responsibilities 3 Table 1: Org. Engagement Levels with Examples and ZT Considerations 5 Figure 3: Zero Trust Design Principles 15 Figure 4: Zero Trust From a People Perspective 16 Figure 5: CISA Zero Trust Maturity Model (ZTMM) 18 Figure 6: Zero Trust Maturity Journey 19 Figure 7: Zero Trust Maturity Model Worksheet 20 Figure 8: Zero Trust Learning Curve 22 © Copyright 2024, Cloud Security Alliance. All rights reserved. viii Course Intro This training assumes that learners are familiar with the introductory content of the Cloud Security Alliance’s (CSA) Zero Trust Training: Introduction to Zero Trust Architecture. Additionally, we recommend that students have at least a basic understanding of networks and network security. This course presents an in-depth exploration of Zero Trust (ZT) from an organizational strategic perspective; and it also delves into the foundational principles of ZT, its benefits, and the critical factors driving organizational buy-in and strategic alignment. This course comprises several units, each addressing a distinct, strategic ZT aspect: We focus on various levels of strategic engagement with ZT; We examine ZT’s value, drivers and business case; We move on to practical tactics for implementing ZT; and We cover the broad impact of a ZT strategy on operations, encompassing areas such as cultural and organizational change, training and education, regulatory compliance, legacy systems and infrastructure challenges, user experience, and adapting to the evolving threat landscape. Course Structure Unit 1: Levels of Strategy Unit 2: Zero Trust Drivers & Buy-In Unit 3: Tactics for Zero Trust Unit 4: Zero Trust & Operations Course Learning Objectives By the end of this course, you will be able to: Understand why ZT is a cybersecurity strategy; Understand the key principles and components of ZT strategy, and its relationship to the organization; Identify how an organization’s business goals, and associated IT strategy can be supported with ZT architecture; Understand the organization’s current state (Business and IT landscape, design architecture, and more); Identify tactics and best practices for a ZT implementation; and Identify critical cultural, organizational and technical challenges for the implementation of a ZT strategy. © Copyright 2024, Cloud Security Alliance. All rights reserved. 1 1 Levels of Strategy Equipping cybersecurity experts with the skills and knowledge they need to successfully implement Zero Trust (ZT) security solutions is a major goal of this course. To effectively implement a ZT strategy, your approach must clearly support existing and new business goals, align with organizational objectives, and secure executive sponsorship and resources. A strong understanding of strategic concepts and an organization’s particular set of strategies is essential. Figure 1: Strategy Perspective of a Standard Org. Chart Though organizational structures vary widely, responsibilities for many roles are more constant, as Figure 1: Strategy Perspective of a Standard Org. Chart, above, illustrates. Hence, since ZT is integral to the cybersecurity footprint, and has a primary focus on technology, it must involve both the IT director and the Chief Information Officer (CIO). And that’s not all. A ZT strategy impacts how product teams develop, deliver and utilize IT products in their line of business (LOB). Collaboration with LOBs is important: If you can foster clarity where there is confusion, especially in the early planning phases, you can effectively convert concepts to intent, and intent to action and results. Configuration state is important for site reliability, and monitoring for breaches or attacks. Though LOBs must focus on their own strategies and approaches to adding value, their cyber activity must be operated and monitored. In the event of breach, tools and business data must be returned to a known state, and preferably to the expected known state. © Copyright 2024, Cloud Security Alliance. All rights reserved. 2 Figure 2: Example of Roles and Responsibilities Regardless of the actual terms used in your organization for each engagement level, if you can clarify how each level influences and informs the others, you are a more effective ZT planner, architect and implementer. We hope that structuring this course around engagement levels helps you better organize and control your ZT-related projects. One of the main goals in discussing strategic terms is to assist you in thinking and communicating clearly and with authority. Clear, concise communication may drive projects to their milestones and ultimate completion. The table below defines organizing engagement levels used in this course (depending on your organization, actual levels may vary), as follows: Organization strategy (this encompasses the business goals and objectives); Cybersecurity strategy (usually a part of IT security strategy); Technology and IT strategy; Tactics; and Operations. © Copyright 2024, Cloud Security Alliance. All rights reserved. 3 Engagement Short Definition Examples in Practice ZT Considerations1 Level Organization A high-level plan Corporation: Seamless Familiarize yourself with Strategy that outlines an integration of the the organization’s common organization’s organization’s third parties, metrics, such as revenue, goals and enabling seamless and net income, margins, cost- objectives. secure collaboration for related figures & cash flow. outsourcers and joint Gain insight from non- venture partners. financial measurements, such as regulatory Departments: Gain support compliance, audit results from decision-makers and more. across departments. Embed ZT principles into the organization’s mission statement and core values. Proactively identify and mitigate security risks at the organizational level. Establish a ZT culture that prioritizes security and privacy. Cybersecurity How an Zero Trust: a security Conduct regular ZT Strategy organization framework that assumes security assessments and protects its that no user or device penetration tests to identify information can be trusted by default. and remediate security and systems, It implements security vulnerabilities. and responds controls to verify users when there are and devices before they cyberattacks. are granted access to resources. ZT strategy can help organizations protect themselves from cyberattacks, even if the attacker has already gained access to your environment. 1 Note: This is not an exhaustive list of ZT considerations, instead it is meant to serve as an example to get students to begin thinking about the different strategic levels and how they relate to ZT. © Copyright 2024, Cloud Security Alliance. All rights reserved. 4 Technology & How an Assets: Take inventory, Invest in new data centers IT Strategy organization classify and categorize and cloud computing uses technology all assets (e.g., identities, technologies. and IT to achieve apps, networks, etc.). Develop a scalable and its business reliable cloud computing objectives. Risk assessment: Conduct platform. a thorough risk assessment Use automation and to help prioritize ZT efforts. DevOps to improve efficiency and agility. Compliance and governance: Align with existing compliance requirements for regulatory adherence and to strengthen the organization’s security posture. Tactics The things you Put ZT frameworks Simplify user access and use. These are into action: ZT Design assign clear management the specific tools, principles, five steps for ZT responsibilities. methods or implementation, Zero Trust Deploy a micro- actions employed Maturity Model (ZTMM). segmentation solution to to execute isolate applications and data strategy. Integrate with standard from each other. business practices: Lean manufacturing practices, JIT inventory management, continuous improvement initiatives. Operations The way you use Integrate user experience Monitor the organization’s them. Details of (UX) and site reliability network and systems for how these tools engineering (SRE) in ZT suspicious activity. and actions are adoption, focusing on Respond to ZT security successfully code-driven automation incidents in a timely and employed in for enhanced operational effective manner. practice to efficacy. Provide ZT security work towards awareness training to the strategic employees. objectives. Table 1: Org. Engagement Levels with Examples and ZT Considerations © Copyright 2024, Cloud Security Alliance. All rights reserved. 5 1.1 Organizational Strategy - The Ultimate Goal Organizational strategy is the overarching, ultimate goal that guides an organization’s actions and decisions. It represents the highest-level objective that an entity aims to achieve. We assume that one of the key approaches that the board of directors and executive team have chosen to improve their cybersecurity strategy is to leverage the principles of ZT. 1.2 Cybersecurity Strategy - Zero Trust “Zero Trust2 is a cybersecurity strategy premised on the idea that no entity or asset is implicitly trusted. It assumes that a breach has already occurred or will occur. Therefore, a user should not be granted access to sensitive information by a single verification done at the enterprise perimeter. Instead, each entity (user, device, application, etc.), and transaction must be continually verified.”3 At the strategy level, ZT differs from traditional cybersecurity strategies by not assuming nor providing any implicit or inherited trust in anything. ZT can impact every person and process inside an organization, as well as the entire technology stack. It should be treated as a holistic cybersecurity strategy that covers all enterprise technology domains. This includes cloud and multi-cloud environments, internal and external endpoints. The strategy also includes organizational and bring your own device (BYOD) scenarios, on-premises and hybrid systems, as well as operational technology (OT) and internet of things (IoT).4 1.2.1 Key Tenets of Zero Trust ZT is a set of principles and practices designed to reduce cyber risk in today’s dynamic IT environments. As a cybersecurity strategy, ZT requires strict authentication and verification for all entities (e.g., each person, device or service) trying to access an IT resource. It doesn’t matter whether the access is inside or outside the physical network perimeter. ZT emphasizes the protection of individual assets (systems and data) rather than network segments. Guiding ZT principles, significance and value vary for each organization, depending on factors such as location, industry and individual traits. The following is a list of some of the tenets that have been discussed5: 2 As many organizations familiarize themselves with Zero Trust, they frequently discover a large amount of misinformation that makes navigating difficult. Cloud Security Alliance’s Zero Trust Advancement Center (ZTAC) cuts through the noise, focusing on solutions, not vendors, and delivering trusted guidance that helps raise ZT strategy to the next level. 3 NSTAC. (2022). Report to the President on Zero Trust and Trusted Identity Management. Pg.1 4 Cloud Security Alliance (N.A) Zero Trust Implementation Primer - The Five Step Process (Draft). Pg. 6. 5 See Cloud Security Alliance course Introduction to Zero Trust Architecture for an in-depth review of ZT tenets. © Copyright 2024, Cloud Security Alliance. All rights reserved. 6 Never trust, always verify: trust no one, either inside or outside the network perimeter (assuming you have one). Assume a hostile environment: Malicious actors reside both inside and outside of any environment you manage. Presume breach: Operate with the assumption that an adversary already has a presence in your environment. For example, by limiting the blast radius to contain the impact of a breach to a smaller number of impacted devices and services. 1.2.2 Strategic Alignment & Operational Integration ZT is a holistic endeavor and not just a tactical change. As such, it represents a strategic realignment of the entire security posture. This realignment starts at the highest engagement with the organizational strategic objective6. For some organizations, this may be synonymous with preventing any breach. For others, it may not be a breach that is most important, but the resiliency in place to limit the impact of it. Furthermore, as the table that defines the different types of organizing levels mentioned (Table 1: Engagement Levels with Examples and ZT Considerations), Zero Trust Architecture (ZTA) is not just a technical recommendation, but also a cultural shift. The shift demands that security aligns closely with business functions, acknowledging that different departments may have varied security needs. There may be other organizational objectives. Regardless of the specific organizational strategic objective, ZT should be seen as the guiding principle or the big idea at the strategy level. ZT should be seen as directly contributing to the organizational strategy. 1.3 IT Strategy & Technology In the context of ZTA, significant adjustments extend beyond technology and IT strategy. The adjustments encompass a fundamental shift in mindset and organizational culture, embracing the “never trust, always verify” principles. Adopting a never trust, always verify approach means that access is continuously validated through rigorous security checks and authentication measures. A necessary transformation in adopting ZT is proliferating and enhancing network segmentation. Segmentation is the sub-dividing of the network environment into smaller, distinct segments to limit access and contain breaches. At the tactical level, implementing ZT involves specific actions. For example, strict access control on a need-to-know basis and secure access to resources regardless of their location. These topics are discussed in more detail in the tactics and operations sections. Such alignment ensures that security enables business operations, rather than hindering them. It requires an architecture that allows for flexibility, catering to different service level agreements (SLAs), administrative controls, audit requirements, regulations and certifications. IT strategy also encompasses user and entity behavior analytics (UEBA). Additionally, technology strategy must integrate closely with governance, while rigorously controlling and monitoring access to reduce risk. Cybersecurity goals, including ZT, should align with the organization’s overall strategy and board-level roadmap, guiding various projects and technology strategies for the upcoming years. 6 In some organizations, this is also referred to as the “grand strategic objective.” © Copyright 2024, Cloud Security Alliance. All rights reserved. 7 The operationalization of ZT is where ZT concepts become tangibly interwoven with the day-to-day activities of the organization. This ensures that every aspect of the network is designed from the inside out with a default perspective of verifying everything and trusting nothing. To make such a perspective functional and practical requires consolidating technologies. IT also requires enhancing security measures for critical assets, and applying specialized controls for legacy and critical infrastructure systems. ZT and technology strategies are closely connected to governance, risk management, and every aspect of security, but it is important to clarify the role of each framework. Governance, focusing on establishing and maintaining policies, standards and guidelines, plays a crucial role in ZT implementations. The governance ensures that ZT practices not only adhere to regulatory requirements but also align with the organization’s overall objectives. This relationship positions ZT as a strategic element within the governance landscape. This lesson does not cover risk management or compliance strategies because they are covered in other lessons. 1.4 Tactics Tactics, within the context of a ZT strategy, are crucial for effectively addressing specific risks and aligning security measures with organizational objectives. These tactics involve prioritizing business goals, adopting an “inside out” security approach, and implementing the principle of least privilege to control resource access. Metrics and reporting improvements are vital for assessing ZT effectiveness. Monitoring and logging network traffic and identifying and protecting critical data, applications, assets and services (DAAS) also plays a pivotal role in these tactics. Additionally, transitioning to ZT requires a phased, risk-based approach that impacts tactics, such as precise policy creation, prioritization, and iterative implementation. Tactics are fundamental in ensuring a smooth transition to a ZTA and are focused on protecting assets and resources efficiently. ZT policies, detailed access controls, monitoring network traffic, and setting progress metrics contribute to the successful implementation of ZT principles. Organizations can bolster their cybersecurity posture by adopting these tactics and gradually progress along a Zero Trust Maturity Model (ZTMM)7, ultimately achieving improved security outcomes. Tactics and the maturity model are covered in the tactics units. NIST Zero Trust Architecture (SP 800-207)8 defines the tenets that are fundamental to a ZT environment. As such, the tenets need to be considered before deploying policy enforcement points (PEPs) and policy decision points (PDPs). To meet these foundational tenets, a dynamic policy must drive the shift away from network access. The policies must motivate organizations to implement measures that reduce the attack surface prone to lateral attacks, such as macro and micro- segmentation. Because all communications must be secured, regardless of location, a tactical assessment is needed. Assessments can ensure adequate encryption has been used for each application, regardless of destination; and access to resources is on a per-session basis. 7 CISA. (2023). Zero Trust Maturity Model (Version 2.0). 8 NIST. (2020). Zero Trust Architecture (SP 800-207). © Copyright 2024, Cloud Security Alliance. All rights reserved. 8 The migration to a ZTA might take from a few months to several years, depending on the maturity level of the organization (See Section Zero Trust Maturity Model) – the path differs for each organization. As noted above, tactical plans are needed for the platform, the tools, the monitoring and detail metrics must each be assessed for the journey. 1.5 Operations Operations refers to the activities, processes and procedures involved in managing and maintaining organizational infrastructure and IT infrastructure. This includes a range of tasks, aimed at ensuring the effective and efficient functioning of all IT resources, such as hardware, software, networks and data storage systems. Embarking on a ZT journey involves cultural and organizational shifts, emphasizing a ZT culture over technology, and securing leadership support for continuous risk management. Training and education geared toward understanding the ZT paradigm is commonly necessary. This includes a strategic appreciation of ZT that targets management, and several other initiatives that emphasize transforming business processes and roles. Regulatory landscapes are also adapting to require robust cybersecurity practices that align with ZT principles. Achieving ZT success involves several important considerations in managing and executing day-to- day operations. When a ZT strategy is implemented, the identity management process should be automated, as should monitoring and detection. Day-to-day tasks people in the roles listed above perform include: Organizing log data so that input logs from different sources can be looked at and analyzed using the same tools and interfaces. Adjusting controls and fine tuning the automation regularly to make sure it checks the right parameters according to policy rules. Monitoring to ensure that the automatic checks of logs catch any activities that don’t follow the policy rule. Ensuring cybersecurity solutions enhance rather than add friction to a user’s productivity and overall experience is an important organizational goal that operational leaders must focus on and defend. Operational processes, such as site reliability engineering (SRE), and a focus on automation and scalable systems, can improve operational efficiency and promote a positive user experience. Furthermore, operational procedures may need updates to align them with a new ZT framework, ensuring that response strategies and daily activities align with ZT principles. Challenges include integrating ZT with legacy systems, where a tailored approach is necessary. Maintaining vigilance in monitoring the evolving threat landscape ensures ZT remains agile and responsive. These concepts are expanded upon in a unit dedicated to ZT operations. © Copyright 2024, Cloud Security Alliance. All rights reserved. 9 2 Zero Trust Drivers & Buy-In For an effective Zero Trust (ZT) implementation strategy, you must align the strategy with organizational values and drivers. The central objective of this approach is to secure buy-in from key stakeholders within the organization. The buy-in ensures that the ZT strategy is not only well- conceived but also well-received and integrated within the organization. Remember, ZT is a context and risk-based approach: access is granted according to specific situations or conditions. Due to these characteristics, ideas that help deliver and implement ZT are usually clearer and gain wider acceptance if you prepare use-case scenarios and provide contextual applications to support them. To get started in defining the desired state, you may wish to ask the following questions: Identifying Catalysts and Business Drivers: What are the primary catalysts driving the adoption of ZT in our organization? What are the key business drivers aligning with ZT implementation? Evaluating Security Posture and Data Access: How does our current security posture align with common attack vectors, especially in the context of our ZT pillars? Is access to confidential and regulated data restricted to registered applications? Enhancing Security and Privacy Strategies: How can we develop a more efficient and effective security strategy under ZT principles? What role does privacy play in our overall security and risk management, and how can we define our privacy objectives? Access Control and Authentication: Are all privileged accounts secured with FIDO2 or equivalent multi-factor authentication (MFA), or are privileged access workstations (PAWs) necessary? Is MFA mandatory for all (people) identities in our environment? Device and Data Access Management: To what extent are personal (non-organization managed) devices allowed access to organizational data? Competitive Advantage through Security: Can we gain a market advantage over competitors through a superior security and privacy strategy? Compliance with ZT in Development: Are our development teams aligning software testing with ZT standards? 2.1 The Value of Zero Trust ZT offers numerous potential benefits, including streamlined security and IT infrastructure management, enhanced data protection, regulatory compliance, reduced compliance-related efforts, increased organizational agility, stakeholder confidence, and lower IT and operational costs9. In other words, the benefits go beyond the security domain. For these reasons, if positioned correctly, ZT has the potential to be a business enabler rather than a hindrance to the organization or its managers. ZT transforms IT and security, aligns business and security goals, and reduces siloed activities. 9 Cloud Security Alliance. (2023). Communicating the Business Value of Zero Trust. © Copyright 2024, Cloud Security Alliance. All rights reserved. 10 Having established the benefits of ZT as a business enabler, the next step involves a tailored approach. The tailored approach aims to integrate ZT into the organization’s unique culture, and business and cybersecurity practices. Before embarking on your ZT journey, clearly define your organization’s goals and challenges, gather relevant information, and align your strategy with business needs. An organization must clearly define its strategy and governance, focusing on what is relevant, what standard (if any) it commits aligning with, who is affected, when and where each applies, and how it’s implemented. Be sure to also capture why a particular strategy or governance policy is important. This exercise ensures that you can explain a new architecture, implement according to related policies, and articulate how your effort seamlessly aligns with the organization’s business model and rules. ZT principles make it easier for IT teams and network infrastructure teams to enforce policies consistently and accurately, enabling a more friction-free work environment. This is because implementation of a Zero Trust Architecture (ZTA) requires moving the access enforcement points closer to the protected asset. 2.2 Risk Management as a Driver In a traditional legacy organization, the risk calculation is predominantly based on a binary trust. If the entity is inside my network environment (or area of control) it is afforded a level of trust. If it’s not on my network or in my area of control then it’s untrusted, and thus there is a need to provide extra security measures, for example a virtual private network (VPN). In the realm of ZT, the foundational principle is never trust, always verify. An organization shifts its capabilities, such that it can continually assess and contextualize the risk or risks involved in granting an entity access to an asset. Remember, this assessment that leads to a decision is not just about having a static defense mechanism in place. It is about creating a proactive, dynamic control plane that evolves with the changing risk landscape. In a ZT environment, access is not only based on contextual factors, it is also temporal. The access needs to adapt to new emerging threats, requiring a continuous review of existing controls and emerging threats. The continuous review must ensure the organization can function without friction from security controls while retaining sufficient protection. The emphasis here is on maintaining consistent, measurable effectiveness. 2.2.1 Board-Level Risk Management & Zero Trust Alignment Aligning a ZTA with an organization’s risk appetite is a strategic process, aiming to deliver security solutions that support the board’s strategic vision. The board plays a crucial role in organizational alignment, as they are responsible for setting and defining the risk appetite, setting budgets and determining the appropriate risk oversight structure. Strategic alignment and budget influences technology and control selection, resource allocation, and policy-making, ensuring a viable cybersecurity strategy. © Copyright 2024, Cloud Security Alliance. All rights reserved. 11 2.2.2 Evolving Threat & Risk Landscape Monitoring the evolving threat and risk landscape is part of risk management. Cyber threats evolve continuously, and implementing continuous monitoring involves regularly assessing and updating an organization’s understanding of potential threats and vulnerabilities. This process includes analyzing cyberattack trends, identifying new methods employed by attackers, and understanding the implications of technological advancements on security. Organizations need to address these challenges to secure their systems. ZT offers a framework that facilitates a shift in mindset that promotes securing and protecting what is important for the organization. 2.3 Create a Case for Zero Trust Organizations measure their health and progress using key financial metrics like revenue, net income, margins, costs, and cash flow. Organizations also consider non-financial indicators such as stock performance, compliance, audit outcomes, reputation, and employee productivity for a comprehensive view. Different stakeholders prioritize various metrics. Understanding these measures is vital for asking more effective questions, understanding drivers, and constructing a meaningful case for adopting ZT. The primary goal of the business case, which is defined further during Cloud Security Alliance’s Zero Trust Planning training, illustrates how an initiative delivers organizational value and return on investment (ROI). The business case also requires alignment with organizational strategy. Consider these organizational elements during the buy-in phase to lay a solid foundation for a successful and strategic implementation of ZT: Alignment with, and assistance in, delivering key business goals and objectives. The value to the business in implementing a ZTA, both tangible and intangible. Key stakeholder buy-in: ZT is everyone’s responsibility, not just the purview of IT or the Chief Information Security Officer (CISO). Gaining support from the key stakeholders across departments is essential. Assets inventory, classification, and categorization of business critical assets or asset classes. These must also be defined in terms of risk to the business. Compliance and governance: Confirm that any changes made by implementing ZT align with existing compliance requirements. This ensures regulatory adherence and strengthens the organization’s security posture. Strengths, weaknesses, opportunities, and threats (SWOT) analysis or cost/benefit analysis (CBA): Perform a SWOT analysis to help identify internal strengths, weaknesses, opportunities and threats. CBAs are also helpful. These help guide IT professionals in the initial stages of a ZT implementation. 2.4 Leadership Buy-In You should look to map the ZT journey so that leadership, especially non-technical leadership roles, can appreciate how it may affect their area of responsibility. The following examples illustrate how © Copyright 2024, Cloud Security Alliance. All rights reserved. 12 ZT may serve as a foundation for areas such as privacy, security, compliance, third-party risk man- agement (TPRM), and simplicity and efficiency at your organization10. These need translating into examples of ZT success using current business problems that your business leaders recognise are improved by ZT. Privacy Data Minimization and Access Control: By adhering to the principle of “never trust, always verify,” ZT ensures that access to sensitive data is tightly controlled and monitored, reducing the risk of unauthorized data exposure. Enhanced User Privacy: ZTAs can protect user privacy by limiting access to personal data and ensuring that only necessary data is processed and stored. Security Reduced Attack Surface: ZT requires strict access controls without implicit trust and micro- segmentation. The two limit the pathways an attacker can use to move laterally across a network. Real-time Monitoring and Response: Continuous monitoring is a key tenet of ZT, allowing for real-time detection and response to threats, thereby enhancing security postures. Compliance Regulatory Alignment: Many regulatory frameworks require strict access controls and data protection measures, which are core components of a ZT model. Audit and Reporting: ZT architectures make it easier to log access and changes, thus supporting compliance reporting and auditing requirements. Third-Party Risk Management (TPRM) Vendor Access Limitations: ZT principles can be applied to third-party vendors to ensure they have only the access and visibility that is necessary to perform their functions. Continuous Verification of Third-Party Credentials: Regular re-verification of credentials and access rights helps to manage and mitigate the risks associated with third-party partners. Simplicity and Efficiency Often the implementation of ZT-based access simplifies the traditional access mechanism for the user, enhancing productivity. ZTA helps with quick and seamless access to the assets irrespective of location and network boundaries. It is essential to designate a person or a limited number of people with the accountability and authority to manage a particular area. A clear owner ensures issues are identified and highlighted at the appropriate level. 10 Cloud Security Alliance. (2023). Zero Trust Guiding Principles. © Copyright 2024, Cloud Security Alliance. All rights reserved. 13 3 Tactics for Zero Trust In this unit, we delve into the tactical aspects of implementing Zero Trust (ZT). We discuss nine crucial sub-sections contributing to building a resilient architecture. Alongside these, we’ll also introduce CISA’s Zero Trust Maturity Model (ZTMM), which, while not a part of the nine steps, is important in understanding the overall progression in ZT implementation. The initial four subsections outline the foundational principles of ZT design, while the subsequent five subsections detail the step-by-step process for ZT implementation. ZT Design Principles Focus on Business Outcomes: Understanding how ZT aligns with and supports the organization’s primary business goals. Design from the Inside Out: Developing a security strategy that starts within the organization before extending outwards. Determine Who/What Needs Access: Identifying which users and devices require access to specific resources. Inspect and Log Key Traffic: Aim to monitor and record critical activity for potential threats as a targeted approach. Foundational Principles of ZT Design Step 1: Define Your Protect Surface(s): Identify and secure critical data and resources within the network (environment). Step 2: Map the Transaction Flows: Understand the movement of data within and outside the organization and the potential classification of each transaction type. Step 3: Build a Zero Trust Architecture (ZTA): Develop the infrastructure and capabilities necessary for ZT. Step 4: Create ZT Policy: Establishing guidelines and rules for network, system and data access and security. Step 5: Monitor and Maintain the Network (Environment): Continuously oversee the ZT environment to ensure ongoing security and adapt to new threats. These elements are vital in shaping and executing an effective security approach aligning with an organization’s objectives. 3.1 Zero Trust Design Principles11 This section explores the foundational design principles that shape an effective ZT security strategy. These principles guide organizations in transitioning from traditional security models to a more robust approach suited for today’s dynamic digital landscape. The focus is on setting goals like designing security from the inside out, accurately determining access requirements, and aiming for thorough inspection and logging of network traffic. It is important to note, however, that the realization of these goals may differ based on an organization’s specific capabilities and resources. 11 (2023) Zero Trust Explained by John Kindervag © Copyright 2024, Cloud Security Alliance. All rights reserved. 14 Figure 3: Zero Trust Design Principles12 3.1.1 Focus on Business Outcomes Shaping a ZT strategy begins with a clear understanding of the organization’s strategic direction and its IT needs. This understanding should incorporate the organization’s specific business threats and the broader spectrum of risks posed by factors like organized crime and nation-state actors. The priority is to safeguard business-critical assets—considered the crown jewels—within a ZT framework. If ZT is the chosen strategy, it’s crucial to prioritize business objectives tailored to your organization’s specific goals and requirements. From the outset, ZT demands a clear vision, whether it’s to manage risks within acceptable limits, reduce compliance costs, or minimize the impact of security incidents. An effective ZT strategy balances security with the cost and value of security and available- resource use to deliver on security initiatives versus other business initiatives like product or feature development, while avoiding excessive measures that could hinder competitiveness. 3.1.2 Design from the Inside Out ZT marks a shift from traditional perimeter-centric security models, which operate on the obsolete premise that everything inside a network is safe, while external entities pose threats. ZT flips this notion, recognizing that threats can originate from anywhere—both inside and outside the network. This paradigm shift dictates a security architecture designed from the inside out. The design begins with the organization’s most critical assets and data at its core and securing access from inside the network, and then extending protection outward. This strategy reorients IT policies to move from a stance of broad threat defense to a focused asset protection approach. The reorientation ensures that the most vital resources are safeguarded at their heart to mitigate the risk of unauthorized access and data breaches. To connect the design shift to operational strategy, it’s important to consider the constraints of limited resources, which all organizations face. This constraint necessitates effective prioritization based on asset value. Conducting a business impact assessment (BIA) or an asset inventory categorized by value helps in identifying critical resources. By ranking assets according to their criticality or value, organizations can efficiently allocate their resources, aligning their security efforts with ZT principles and securing both protect and attack surfaces more effectively. 12 Figure adapted from: (2023) Zero Trust Explained by John Kindervag. © Copyright 2024, Cloud Security Alliance. All rights reserved. 15 To connect the design shift to operational strategy, it’s important to consider the constraints of limited resources, which all organizations face. This constraint necessitates effective prioritization based on asset value. Conducting a business impact assessment (BIA) or an asset inventory categorized by value helps in identifying critical resources. By ranking assets according to their criticality or value, organizations can efficiently allocate their resources, aligning their security efforts with ZT principles and securing both protect and attack surfaces more effectively. 3.1.3 Determine Who & What Needs Access Today, organizations operate on a global scale, leveraging remote work, joint ventures, outsourced services, and cloud technology. In a ZT security approach, the principle of least privilege (attribute of never trust, always verify) necessitates a precise determination of who or what needs access to certain resources, along with the duration and associated risks of such access. This principle ensures that each entity – be it a user or a system – has access strictly as per their need, thus narrowing the attack surface and enhancing security. An asset’s visibility should strictly conform to the need-to- know basis, remaining invisible to those without a legitimate requirement for access. Figure 4: Zero Trust From a People Perspective13 The concept derived from the Identity Security Alliance, as depicted in Figure 4 Zero Trust From a People Perspective, encompasses seven elements: users, applications, infrastructure, identity, device/workload, access, and transaction. Training individuals outside of security roles, like network teams and developers, to identify and manage trust relationships across these elements is a key challenge. Critical tasks include mapping out where trust is established. Examples include between users and identities or infrastructure and identities, and adopting secure practices like proper firewall configurations and secure coding. A thorough understanding of these trust points allows for the effective identification and mitigation of vulnerabilities that cybercriminals target. Benefit is derived from the insights gained through extensive penetration testing experience. 13 Cloud Secuirty Alliance. (2023) The Most Important Part of Zero Trust: People by George Finney © Copyright 2024, Cloud Security Alliance. All rights reserved. 16 3.1.4 Inspect & Log Traffic Two key principles of ZT, as outlined in NIST Zero Trust Architecture (SP 800-207)14, are: Continuously monitoring and assessing the security and integrity of all assets and resources. Gathering extensive information on the current state of assets, network infrastructure, and communications to enhance security measures. In the journey towards ZT adoption, organizations require some sort of logging and monitoring capabilities. The level of sophistication will vary greatly, depending on the level of organizational maturity, and the resources available. This process typically begins with the establishment of foundational log management practices. This means starting with the basic yet important step of implementing systems to gather user and entity activity logs, particularly focusing on privileged credentials, coupled with routine manual analysis. This initial phase should cover all essential ZT pillars, laying the groundwork for more advanced security measures. As the organization’s maturity in the ZT framework advances, supplemented by adequate resources and expertise, it can evolve these practices into more sophisticated systems. A key development in this evolution is the integration of a security information and event management (SIEM) system. SIEM serves as a pivotal tool for automated log aggregation and analysis, setting the stage for the adoption of security, orchestration, automation, and response (SOAR) capabilities. In scenarios where the organization has control over network-level infrastructure or can log traffic at the access gateway, it’s strategically important to incorporate relevant and contextual ZT logs into a SIEM system or log management tool. This integration not only enhances the organization’s security posture but also aligns with the fundamental principles of ZT. The integration ensures continuous monitoring and adaptation to the ever-evolving security landscape. The ability to assess and log relevant and contextual traffic from both internal and external sources can significantly enhance operational intelligence. Additionally, at high levels of maturity, the carefully selected log data from various layers or applications can be unified into a common data structure. Data captured includes device, time, user, and the resource or asset access (e.g., server, service, application, etc.) requested. By coupling monitoring and logging, engineers can continuously improve security by rapidly countering any suspicious activity. Continuously scrutinizing traffic patterns in such a manner is a powerful, strategic asset. Capturing data and monitoring it in real time requires the development of reactive controls, including system and organization controls (SOC) assessments, analysis, response staff and automation in the response pipeline. Logging is only any good if you do something with it, but for the many organizations without a SOC in place, there is no reason for a major consolidated log database. It is acceptable for the ZTA configuration to simply monitor and log: At the policy decision points (PDPs); All admin operations; and All user access event logs. 14 NIST. (2020). Zero Trust Architecture (SP 800-207) © Copyright 2024, Cloud Security Alliance. All rights reserved. 17 3.2 Zero Trust Maturity Model Figure 5: CISA Zero Trust Maturity Model (ZTMM)15 This section covers the CISA Zero Trust Maturity Model (ZTMM)16, which helps organizations enhance their ZT strategies. The CISA ZTMM outlines maturity stages – Traditional, Initial, Advanced, Optimal – across ZT pillars (Identity, Devices, Networks, Applications and Workloads, and Data) and capabil- ities (visibility, automation, governance). These maturity stages help organizations assess, plan and implement the necessary measures to progress toward a more secure ZTA. The CISA ZTMM journey, depicted in the accompanying figure, represents a path towards achieving optimal ZT maturity. This journey, a practical visual representation, shows how companies advance through ZT’s various matu- rity levels. 15 Figure adapted from: CISA. (2023). Zero Trust Maturity Model (Version 2.0). 16 CISA. (2023). Zero Trust Maturity Model (Version 2.0). © Copyright 2024, Cloud Security Alliance. All rights reserved. 18 Figure 6: Zero Trust Maturity Journey17 To utilize the CISA ZTMM effectively, grasp the framework, refine your functions and assess your current ZT maturity. Finally, plan steps for maturity advancement and align them with organizational projects and priorities, using a prioritization model to guide you. 3.2.1 Zero Trust Maturity Model in Practice Tailoring the CISA ZTMM to fit your needs may seem overwhelming. It is not advisable to strive to achieve optimal maturity across all pillars simultaneously. Nor is it advisable to focus on a single pillar and expect to perfect it across the entire organization. Attempting to perfect one pillar (like identity) across all systems before moving to the next is not only impractical but can lead to stagnation in overall security posture improvement. It is important, instead, to evaluate each protect surface, using worksheets such as the one illustrated below, which is based on the NSTAC report. Each worksheet identifies the protect surface and critical data, assets, application, and services (DAAS) element being evaluated, with 5 (optimized) representing the best possible score for each attribute. The total perfect score on a worksheet would be 25. This is a rare occurrence. Such worksheets help teams prioritize projects, based on safeguarding business-critical assets. This targeted approach allows for a more accurate assessment of maturity gaps and enables the development of specific projects to enhance the security and maturity of each protect surface. Furthermore, by evaluating each protect surface individually, organizations can create a more nuanced and actionable cybersecurity roadmap. Finally, all the protect surfaces can aggregate to define an overall score for the organization as well as an average score per protect surface. 17 Figure adapted from: (2023) Zero Trust Explained by John Kindervag. © Copyright 2024, Cloud Security Alliance. All rights reserved. 19 Figure 7: Zero Trust Maturity Model Worksheet18 This methodology simplifies the complexity inherent in managing multiple and discrete identity solutions across an organization. For example, if an organization focuses on improving the security maturity of its directory services (as a protect surface), it can methodically elevate the maturity level in this specific area, thereby making tangible progress and ensuring continuous improvement in cy- bersecurity defense. Finally, it helps you monitor progress across various ZT projects to stay aligned with your organization’s IT strategy and cybersecurity strategy. 3.2.2 CISA-Based Maturity Model You may also wish to explore this interactive CISA ZTMM Spreadsheet model19, a comprehensive tool with status bars for monitoring progress. After a ZT assessment, approach the journey system- atically, with the same considerations that we suggested if you choose to use the National Security Telecommunications Advisory Committee (NSTAC) based assessment model: Analyze all functions, adjusting the depth as needed; Avoid tackling all functions simultaneously so as to not be overwhelmed; Focus on enhancing specific areas within individual projects, addressing a single protect surface at a time; and Ensure projects align with business drivers and deliver tangible business value, not just security benefits. You are encouraged to tailor the ZTMM approach to your organization’s needs. This pragmatic ap- proach ensures that the journey towards a mature ZT environment is both achievable and manage- 18 Figure adapted from: NSTAC. (2022). NSTAC Report to the President on Zero Trust and Trusted Identity Management. Pg. A-1 19 Jason Garbis and Numberline Security have created The Zero Trust Maturity Model Resource Center and associated worksheets (GCP Sheets and Excel), aligned with the CISA ZTMM. Learn more about these tools here. © Copyright 2024, Cloud Security Alliance. All rights reserved. 20 able, because it keeps you flexible. Remember that the goal is delivering tangible value to your busi- ness, with ZT maturity serving as a measure of progress and a guide for prioritizing enhancements in your implementation. 3.3 The Five Steps for Zero Trust Implementation In the journey towards an ideal ZT architecture, there are five essential steps to follow to operational- ize each protect surface project. These steps provide a structured approach to enhance cybersecurity and ensure a successful transition to a ZT paradigm. Organizations can gain a deeper understanding of their data interactions by: Beginning with the definition of protect surface(s) and a risk-based strategy in Step 1; Mapping transaction flows in Step 2; Building and implementing protect surface projects (tailoring the ZTA), that emphasize flexibility and customization to work alongside existing network environments in Step 3; Focusing on creating precise ZT policies, addressing the who, what, where, when, why, how, and for how long of access controls in Step 4; and Continuous monitoring and maintaining the network (environment) as it enters production (fundamental to the sustained success of a ZTA) in Step 5. These five steps collectively form the foundation for implementing a comprehensive ZT strategy. 3.3.1 Step 1: Define Your Protect Surface(s) As you embark on your ZT journey, shift your perspective to focus on what you’re protecting rather than what you’re defending against. Visualize your end goal and prioritize safeguarding critical and vulnerable components within your protect surface, known as DAAS. Organizations should prioritize identifying protect surfaces, and then document attack surfaces to complement them, steering clear of a traditional, attack-surface-centric approach. Examples include: Data: Sensitive information. Examples include: Payment card industry (PCI); Protected health information (PHI); Personally identifiable information (PII); and Intellectual property (IP) that can cause significant harm if compromised. Applications: Software interacting with sensitive data or controlling essential assets and processes related to the business. Assets: IT, OT, or IoT devices such as point-of-sale (PoS) terminals, supervisory control and data acquisition (SCADA) controls, and networked medical devices. Services: Examples include: Domain Name System (DNS); Dynamic Host Configuration Protocol (DHCP); Active Directory; and Network Time Protocol (NTP). © Copyright 2024, Cloud Security Alliance. All rights reserved. 21 To deploy ZT environments, organizations should focus on two factors: the criticality of the protect surface and the duration of the ZT journey, ideally ongoing. Data classification – as identified above (data sensitivity) – is a critical starting point. Start with low-sensitivity learning protect surfaces, like lab environments or non-critical web pages, allowing for safe experimentation and failure. Progress to practice protect surfaces, which are more sensitive but not the organization’s most critical assets. This step-by-step approach builds confidence in ZT principles before moving to the most sensitive areas. After securing high-value assets, the focus shifts to less critical protect surfaces, gradually covering all significant areas in the ZT environment. Figure 8: Zero Trust Learning Curve20 3.3.2 Step 2: Map & Prioritize the Transaction Flows The fundamental objective of this step is to prove to your audience that you have an understanding of how the whole cybersecurity system works. Mapping transaction flows for each protect surface is critical for understanding how DAAS components interact (how the system works). The mapping is also critical for determining the optimal placement of controls for data protection. These network traffic patterns, specifically tailored to the protect surface data, are essential for shaping the overall design. Once the transaction flows have been mapped, the next task involves prioritizing, which may also be shaped by the reality of the readily available resources. This process involves determining how resources, such as personnel, time and budget, should be allocated to these prioritized flows to im- plement the ZTA efficiently. From a strategic viewpoint, defining protect surfaces and prioritizing transaction flows are neces- sary inputs to request and allocate necessary resources (e.g., budget and personnel). For example, 20 Figure adapted from: (2023) Zero Trust Explained by John Kindervag. © Copyright 2024, Cloud Security Alliance. All rights reserved. 22 business processes involving sensitive data should be prioritized, as these processes are crucial for establishing access rights and conditions within the ZTA21. To ensure a smooth transition to ZTA, starting with a low-risk business process is advisable, minimizing disruption and gaining valuable experience before moving on to more critical processes. 3.3.3 Step 3: Build a Zero Trust Architecture Implementing a ZTA through protect surface projects is a journey that modifies the existing infra- structure and processes rather than replaces what has already been implemented. Designing protect surface projects involves mapping transaction flows, identifying controls and secondary protect surfaces, and ultimately designing a system or solution. Even in a completely new environment, transitioning to ZTA within a single technology refresh cycle is improbable. Adapting existing work- flows to ZTA likely necessitates, at the very least, a partial overhaul. How an enterprise migrates to a strategy depends on its current cybersecurity posture and operations. Migrating to ZTA requires an organization to have detailed knowledge of its assets (physical and virtual), subjects (including user privileges), and business processes. Let us put these principles into plain and practical language. The protect surface with the most sensitive assets is in most need of ZT. Temptation: address this surface first. However, the services, assets or business data contained therein might need approvals from more than one department. As we mentioned earlier, as a strategic thinker, you may benefit from delivering a faster or easier win. To establish confidence and trust within the organization, you can opt to improve a protect surface that needs less approvals and less time to complete – the low-hanging fruit. Another strategy might be to look at protect surfaces where you can build some shared services, or consolidate some technologies. Your benefit here is in showing value and then repeating what you have done on other protect surfaces. With each consecutive instance producing better results in less time. Something complex, such as centralization of Identity Providers (IdP centralization), may be challenging in situations where you are implementing a centralized IdP in a large or complex organi- zation, running legacy systems and diverse application environments. Visible benefits may include simplified management, a better user experience or improved compliance with regulatory require- ments22. ZT frameworks are not tied to any specific technology, allowing organizations to fully customize their security measures based on their unique protection needs. This flexibility allows for a security ap- proach that is focused on critical protect surfaces within the organization. Dividing the network into smaller, distinct segments to limit access and contain potential breaches, ensuring that even if one segment is compromised, others remain secure heightens security and control over data flow within the organization. Enterprises can adopt various approaches to implement ZTA, emphasizing differ- ent components and policy rules. These approaches, namely governance-driven enhanced identity, logical micro-segmentation, network-based segmentation, cloud usage and outsourcing, and even removal of the corporate network altogether, all can adhere to ZT principles. NIST. (2020). Zero Trust Architecture (SP 800-207) 21 See NSTAC. (2022). NSTAC Report to the President on Zero Trust and Trusted Identity Management. 22 Appendix A and B for more ideas. © Copyright 2024, Cloud Security Alliance. All rights reserved. 23 Typically, a complete ZT solution incorporates many different elements. The suitability of each approach varies, depending on the strategic business direction and risk defined by the board, and should flow down into the architectural solution chosen. While one approach may align seamlessly with a chosen use case and policies, it doesn’t imply that other approaches wouldn’t work. Indeed, al- ternative approaches, while more challenging to implement, may provide better long term alignment with the overall strategic business direction. Depending on the enterprise, multiple ZTA deployment models may be employed within a particular organization for various business processes.23 3.3.4 Step 4: Create Zero Trust Policy ZT policies form the cornerstone of a secure ZTA. While these policies are initially static, they should be designed to evolve dynamically in tandem with the organization’s progression in implementing and maturing its ZTA. To effectively implement ZT, organizations should use the 5 W’s plus How for policy creation. This method helps the effort focus on defining granular access controls and considerations for resource access. It also helps you to write specific policy statements and procedures, tailored to the protect surface access perspective. The list below outlines the key aspects that should be factored into any risk evaluation when creating ZT policies: Who: Determine which entities (people, devices, organizations, code, agents, etc.) should be allowed to access a particular resource. What: Understand the context in which the entity tries to access systems and/or data When: Define the time frames or conditions under which the entity may access the resource. Where: Identify the location, network, or geo-fence that allows the entity access. Why: Establish why the entity (the “Who”) needs access to the resource, emphasizing the justification. How: Define the technological controls necessary to deliver appropriate risk-based controls to satisfy the 5 W’s. 3.3.5 Step 5: Monitor & Maintain the Network In the CISA ZTMM, visibility and analytics provide the insights that improve ZT operations. Knowing the current and dynamic state of each protect surface’s security posture within the network (environ- ment) is critical to any potential response. This involves a focus on logging, monitoring and prompt alerting. These components enable continuous improvement and an effective incident response framework. Regular feedback loops, efficient incident detection, a robust response plan, and the ongoing monitoring of activities are key to maintaining and updating policy rules. It’s also important to regularly review and modify the protect surface and automated policies, which can be achieved through quarterly reviews of ZT identity, devices, access, policies, and protect sur- faces. To learn more about model variations, review these Cloud Security Alliance courses: Introduction to 23 Software-Defined Perimeter and Architectures and Components of Software-Defined Perimeter. © Copyright 2024, Cloud Security Alliance. All rights reserved. 24 By continually monitoring and updating each subsequent protect surface, organizations can progres- sively strengthen their security posture. Such continuous oversight not only enhances security but also improves operational efficiency, speed of access, and flexibility, contributing to overall produc- tivity. Communicating these returns on investment to leadership is essential to acknowledge the long-term benefits of the ZT strategy. 4 Zero Trust & Operations When organizations conduct a detailed technology landscape assessment, they should identify spe- cific areas where Zero Trust (ZT) principles can and should be applied to optimize or extend existing controls. These enhancements encompass a range of security technologies, including continuous authentication and authorization, user and entity behavior analytics (UEBA), and dynamic policy enforcement points (PEPs). Automation and orchestration, based on the designed Zero Trust Archi- tecture (ZTA), are ZT enablement items. Here is a list of common operational areas impacted by ZT strategy: System administration; Network management; Data management; Performance monitoring; Helpdesk and support; and DevOps and engineering (access workflow). This section delves into the multifaceted approach necessary to effectively adopt and integrate ZTA. It also emphasizes the need for a shift in corporate culture, tailored to each organization’s unique business type and directorial objectives. Education initiatives are vital for both staff and senior man- agement to understand and communicate the business value of ZT. This educational aspect is pivotal for gaining board buy-in and aligning ZT with the organization’s strategic goals. In response to the evolving cybersecurity regulatory landscape and the inadequacy of traditional security models, ZT offers a proactive and comprehensive framework to protect sensitive data and infrastructure. Organizations need to be aware of regulatory requirements in different regions and adapt their ZT strategy accordingly, especially those with legacy systems. The organization may need to adopt a vendor-based readymade solution to construct the automated workflow to integrate multiple ZTA elements. More orchestration at each step, such as during access and monitoring, can make the operation easier and more adoptable. Finally, the integration of user experience (UX) and site reliability engineering (SRE) plays a critical role in the successful adoption of ZT. By focusing on UX and automated, code-driven solutions, organizations can foster greater team support, reduce human error, and ensure that security mea- sures are both effective and user-friendly, ultimately enhancing their security posture and operational efficiency. © Copyright 2024, Cloud Security Alliance. All rights reserved. 25 4.1 Cultural & Organizational Shift The following list highlights areas for corporate culture shifts, tailored to each organization’s specific business type and directorial objectives. Cultivate a ZT culture: Emphasize people, processes and organizational aspects over technology acquisition. Implement continuous monitoring, logging and responsive actions. Change the tone from the top: Secure executive endorsement and support for ZT initiatives, ensuring leadership commitment. Develop a communications plan for consistent stakeholder alignment and guidance on the ZT journey. Instill a culture of continuous risk management: Continuously assess and measure risk to guide access decisions and align with risk appetite. 4.2 Training & Education Educational initiatives help ensure IT staff, senior management and line-of-business (LOB) managers understand the new ZT paradigm. ZT-informed executives are key to communicating ZT’s business value, especially in getting board buy-in. This involves demonstrating how ZT aligns with the organi- zation’s strategic objectives. In parallel, it is important to educate the broader workforce. This edu- cation should focus on differentiating ZT principles from mere technology tools, helping employees understand the fundamental concepts of ZT. Training reaching the broader workforce should also provide an understanding of revised roles within the ZT framework. Where applicable, the organization’s audit functions (both internal and external) need to participate in the educational process. Auditors need to be informed about how ZT architecture enhances organi- zational security and resilience. Lastly, ZT training should be integrated into the existing training program for all staff. This integration ensures that future updates, scheduling and necessary refreshes are consistently applied and not overlooked by the organization’s training and education functions. 4.3 Regulatory & Compliance Shift The cybersecurity regulatory landscape is undergoing a dynamic transformation, spurred by the escalating complexity and frequency of cyber threats. Traditional security models are increasingly in- adequate in this environment, prompting governments and industry regulators to endorse proactive and comprehensive frameworks like ZT for safeguarding sensitive data and critical infrastructure. In this evolving scenario, specific regulations and compliance standards, such as General Data © Copyright 2024, Cloud Security Alliance. All rights reserved. 26 Protection Regulation (GDPR)24 and Health Insurance Portability and Accountability Act (HIPAA)25, are being updated to necessitate the adoption of ZT-aligned security controls. This trend is especial- ly pronounced in the finance, healthcare and government sectors, where the sensitivity of stored personal data heightens the urgency. While not all regulations mandate ZT principles yet, the shift is undeniable in these highly regulated industries, where compliance is not just a legal formality but a critical defense against modern cyber threat. 4.3.1 Regional Regulations Organizations must stay informed about the regulatory requirements in the countries and regions where they store data and operate. The advent of new regulations often brings the need for specific assessments or attestations, particularly during transitions to ZTAs. In the United States, for instance, compliance with the Federal Information Security Management Act (FISMA) becomes crucial for US federal government entities, and their suppliers and service providers. This often necessitates optimization and automation of compliance tasks. The reasoning behind this is linked to the requirements of FISMA, which mandates that agencies undergo a rigorous cycle of assessment and reauthorization of systems, especially when making significant changes like adopting ZT. The challenge lies in legacy environments, where agencies frequently find it difficult to keep pace with these demanding tasks, resulting in potential delays or constraints in fully transition- ing to a ZT framework. 4.4 Legacy Systems & Infrastructure Specialized technologies – sometimes legacy-based – such as OT, IoT or industrial control systems (ICS) devices, are often deployed within critical infrastructure services and often have significant technical constraints in key areas, such as patching and access control. This and similar technologies may require implementing specialized micro-perimeter access control technologies and strategies to achieve ZT objectives for such infrastructure. Organizations with legacy systems and traditional trust models often encounter challenges in adopting ZT, particularly due to limited network and asset visibility. As we have mentioned in other sections, the transition to ZT varies with each organization’s unique attributes, including its maturity level, mission and specific challenges. Not all legacy systems require immediate ZT upgrades, but any updates should be strategically planned to address emerging threats and system modernization. Legacy infrastructure influences the adoption of ZT models. For example, the Information Security Continuous Monitoring (ISCM) model requires adaptable systems for its data movement workflows. Legacy systems’ rigidity can hinder the implementation of such models. Additionally, an organiza- tion’s experience with measurement programs affects its ability to adopt ZT, with more mature orga- nizations adapting more easily than those with less developed measurement capabilities. 24 General Data Protection Regulation is designed to protect data and privacy of European Union citizens. 25 Health Insurance Portability and Accountability Act is United States legislation designed to, in part, protect a patient’s health information. © Copyright 2024, Cloud Security Alliance. All rights reserved. 27 4.5 Usability & Friction This section explores the integral role of user experience (UX) and SRE26 in promoting the adoption of ZT architecture in organizations. The focus is on refining UX to boost the acceptance of ZT principles while shifting towards a more automated, code-driven approach. This shift not only enhances team support but also minimizes human error, thus strengthening SRE practices. The synergy between UX and SRE ensures that security measures are not only effective but also user-friendly, enhancing the organization’s security posture and ensuring smooth operational processes. The key to fostering ZT acceptance among employees is to prioritize UX and implement solutions through code and automa- tion, leading to greater team buy-in and improved SRE outcomes. 4.5.1 User Experience Incorporating UX helps encourage ZT acceptance and adoption within an organization. A key aspect of this is transitioning from manual processes to code-based automation. By leveraging automation and code, team acceptance is increased, and the likelihood of human error is significantly reduced. This shift improves SRE practices. A well-designed UX ensures that security measures are robust and user-friendly, fostering a more secure and efficient work environment. 4.5.2 Site Reliability Engineering SRE combines software engineering and IT operations to build scalable and reliable systems. Focused on proactive management through continuous monitoring, automation, orchestration and scalability, SRE planning is a key part of ZT security, helping to maintain system integrity and resilience, includ- ing early vulnerability detection and efficient resource management. Applicable to both cloud-based and on-premises environments, SRE’s principles, such as automation, performance monitoring and incident management, universally enhance system reliability, regardless of the hosting setup. Automation and orchestration (AO) are usually coupled terms, enabling ZT improvement in two important ways. First, AO provide automated feedback that improves access controls, policies, and enforcement, based on feedback loops. Second, with infrastructure as code (IaC) and automated compliance checks, automated scripts and tools can continuously check compliance with ZT policies, ensuring that any deviations are quickly detected and rectified. AO also enables rapid response to detected threats by automatically adjust- ing access controls and network configurations in real-time. IaC helps prevent infrastructure drift – the phenomenon where the live state of the network diverges from the state defined in code. This alignment is vital for maintaining the integrity of ZT policies. 4.5.2.1 Monitoring & Understanding System Compromises In ZT security, monitoring the technology stack is crucial for vulnerability detection, with SRE en- hancing this through continuous system monitoring and logging. This approach enables quick iden- 26 Google. (2016) Site Reliability Engineering. © Copyright 2024, Cloud Security Alliance. All rights reserved. 28 tification of potential breaches and supports proactive security measures. Additionally, SRE aids in understanding system compromises through postmortem analysis and learning from failures, which is essential for secure recovery and resilience enhancement. Practices like thorough incident doc- umentation and blameless postmortems help teams understand root causes and reinforce system defenses. 4.5.2.2 Resource & Component Management In the context of ZT security, deploying immutable resources may play a crucial role, and this is where SRE becomes significant. Immutable resources refer to infrastructure components that, once deployed, are not modified. Instead, if changes are needed, new instances of the resources are de- ployed. SRE facilitates this by automating the deployment process, ensuring that new instances are consistent, reliable, and verifiable. This approach reduces the risk of configuration drift and unautho- rized changes, aligning well with the ZT principle of “never trust, always verify.” SRE’s focus on auto- mation and reliability ensures that deploying immutable resources is efficient and secure. A decisive and swift response may be necessary when a system component is compromised. This approach is akin to rapidly decommissioning and replacing – effectively and quickly removing and substituting the compromised component with a new, secure instance. SRE supports this rapid response strategy with practices like infrastructure as code and automated deployment pipelines. These practices allow for the quick rollout of new, unaffected instances, minimizing downtime and exposure to threats. By automating the replacement process, SRE ensures that the response to secu- rity incidents is fast and reliable. © Copyright 2024, Cloud Security Alliance. All rights reserved. 29 Conclusion In Zero Trust (ZT), the levels of strategic engagement include several components. At the top is the organization’s strategy, guiding overall actions and decisions. Below this, at the strategy level, ZT redefines traditional trust concepts in computing, emphasizing continuous verification due to the inevitability of breaches. Aligning ZT with organizational values involves understanding its adoption drivers, like compliance and security enhancement, and how it offers competitive advantages such as streamlined security and cost reduction. Risk management is key, focusing on protecting digital assets and requiring clear ownership for risk handling. Building a business case for ZT involves assessing financial and performance impacts, gaining cross-departmental stakeholder buy-in, and aligning it with organizational strategy. Tactics for ZT implementation include focusing on specific business outcomes, internal security design, and managing access permissions. Successful ZT adoption necessitates a cultural shift, integrating continuous risk management, executive support, and comprehensive education across all organizational levels. It also involves adapting to regulatory changes. Overall, ZT is a cybersecurity approach that requires strategic alignment, planning, and execution for full effectiveness. Glossary For additional terms, please refer to our Cloud Security Glossary, a comprehensive glossary that combines all the glossaries created by CSA Working Groups and research contributors into one place. © Copyright 2024, Cloud Security Alliance. All rights reserved. 30 Acronym List Acronym Term AD Active Directory AO Automation and Orchestration BYOD Bring Your Own Device C-Suite Chief-Suite CBA Cost/Benefit Analysis CFO Chief Financial Officer CIO Chief Information Officer CISO Chief Information Security Officer COO Chief Operating Officer DAAS Data, Applications, Assets and Services DHCP Dynamic Host Configuration Protocol DNS Domain Name System FISMA Federal Information Security Management Act HR Human Resources IaC Infrastructure as Code ICS Industrial Control Systems IdP Identity Providers IoT Internet of Things IP Intellectual property ISCM Information Security Continuous Monitoring IT Ops Information Technology Operations LOB Line of Business MFA Multi-Factor Authentication NSTAC National Security Telecommunications Advisory Committee NTP Network Time Protocol OT Operational Technology © Copyright 2024, Cloud Security Alliance. All rights reserved. 31 PAW Privileged Access Workstations PCI Payment card industry PDPs Policy Decision Points PEPs Policy Enforcement Points PHI Protected health information PII Personally identifiable information PoS Point-of-Sale ROI Return on Investment SCADA Supervisory Control and Data Acquisition SIEM Security Information and Event Management SLA Service Level Agreement SOAR Security, Orchestration, Automation, and Response SOC Security Operation Center SRE Site Reliability Engineering SWOT Strengths, Weaknesses, Opportunities, and Threats TPRM Third-Party Risk Management UEBA User and Entity Behavior Analytics UX User Experience VPN Virtual Private Network ZT Zero Trust ZTA Zero Trust Architecture ZTMM Zero Trust Maturity Model © Copyright 2024, Cloud Security Alliance. All rights reserved. 32

Use Quizgecko on...
Browser
Browser