Definitive Guide To Zero Trust Security ColorTokens
Definitive Guide To Zero Trust Security ColorTokens
Definitive Guide To Zero Trust Security ColorTokens
to
Zero Trust Security
Secure Your Cloud Workloads,
Applications, and Endpoints
with Micro-segmentation
Jon Friedman
Foreword by Tony Scott
With contributions from Scott Emo,
Kayvon Sadeghi, and Ajay Uggirala
Definitive Guide™ to Zero Trust Security
Published by:
CyberEdge Group, LLC
1997 Annapolis Exchange Parkway
Suite 300
Annapolis, MD 21401
(800) 327-8711
www.cyber-edge.com
Copyright © 2020, CyberEdge Group, LLC. All rights reserved. Definitive Guide™ and
the CyberEdge Press logo are trademarks of CyberEdge Group, LLC in the United
States and other countries. All other trademarks and registered trademarks are the
property of their respective owners.
Except as permitted under the United States Copyright Act of 1976, no part of this
publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning
or otherwise, without the prior written permission of the publisher. Requests to the
publisher for permission should be addressed to Permissions Department, CyberEdge
Group, 1997 Annapolis Exchange Parkway, Suite 300, Annapolis, MD, 21401 or
transmitted via email to [email protected].
Publisher’s Acknowledgements
CyberEdge Group thanks the following individuals for their respective contributions:
Editor: Susan Shuttleworth
Graphic Design: Debbi Stocco
Production Coordinator: Valerie Lowery
Table of Contents
Foreword..................................................................................................................... v
Introduction.............................................................................................................. vii
Chapters at a Glance...........................................................................vii
Helpful Icons.....................................................................................viii
Glossary................................................................................................................... 40
Foreword
Chapters at a Glance
Chapter 1, “The Promise of Zero Trust Security,” sum-
marizes the basic concepts and benefits of zero trust security.
Helpful Icons
TIP
Tips provide practical advice that you can apply in your own
organization.
DON’T FORGET
When you see this icon, take note as the related content
contains key information that you won’t want to forget.
CAUTION
Proceed with caution because if you don’t it may prove costly
to you and your organization.
TECH TALK
Content associated with this icon is more technical in nature
and is intended for IT practitioners.
ON THE WEB
Want to learn more? Follow the corresponding URL to
discover additional content available on the Web.
Chapter 1
Micro-segmentation
should be applied
All networks should be finely segmented and access control
policies should be enforced between segments. This is
known as micro-segmentation. Without this very granular
segmentation, attackers who have acquired user credentials
or compromised a system can roam freely across the entire
infrastructure. So can malicious insiders.
As we will discuss, micro-segmentation can be applied not
just to networks, but also to applications, and even individual
servers, devices, endpoints, and workloads.
Strengthen compliance
Zero trust security solutions can strengthen compliance by:
In This Guide…
Zero trust security is a broad (and rapidly evolving) subject. In
this guide we focus on major topics related to:
We will not have enough space here to cover a few related top-
ics such as dynamic authentication, but you can find articles
and reference works about those topics on the web.
Chapter 2
The Steps
Figure 2-1 shows the steps you can use to implement zero
trust security.
TIP Don’t try to map the entire IT environment at once. Start with
one standalone application or high-value asset so you can
prove the concept and learn by doing.
Create policies
The next step after defining zero trust zones is to create secu-
rity policies to control access between them.
Zero trust security solutions usually employ techniques to cre-
ate and manage policies that are very different from firewall
and VLAN rules. Some of these are:
Obtaining Comprehensive
Visibility
In this chapter
• Learn about the process for discovering and classifying entities
• Discover how visual maps can be used to find indicators of
attack, support incident response, and assess risk
Discover Entities
To make zero trust security work, you need to discover many
types of entities in your IT environment, including users,
network segments, systems and devices, applications, work-
loads, and endpoints. Fortunately, most of the process can be
automated.
14 | Definitive Guide to Zero Trust Security
Visualization tools
Your maps can involve hundreds during the classification process
of entities and thousands of
• Zoom in to focus on small cor-
connection paths. To help answer
ners of the map, and zoom out to
questions and solve problems,
obtain a “big picture” view of the
zero trust security platforms usu-
groups and traffic between them
ally include a visualization tool that
makes it easy to: • Filter and organize views based
on criteria such as zero trust
• See what entities (including enti-
zone, type of resource, location,
ties on cloud platforms) belong
and relevance to a compliance
to the logical groups created
standard
TIP Look for a zero trust security solution that can use tags to clas-
sify entities and to update zones and policies automatically
when conditions change.
Chapter 3: Obtaining Comprehensive Visibility | 15
Say what?
Software-defined micro-segmentation? Let’s break down that
term.
The original definition of micro-segmentation in IT was the
division of a network into small segments or zones with bar-
riers or access controls between them. With the widespread
adoption of virtualization and cloud platforms, the term has
evolved to mean the division of a network and the resources
on it into zones (e.g., a single server or a workload can be a
zone).
Software-defined micro-segmentation means that enti-
ties and zones are described in terms of logical attributes
abstracted from underlying hardware and networks. Entities
described logically are much easier to manage in a dynamic
environment.
For example, for a CRM system you might start by scoping out
the elements shown in Figure 4-2 to identify:
Figure 4-2: A high-level model shows the main elements of the zone, users,
supporting resources, and related information.
Create Policies
Everything not permitted is
forbidden (whitelists)
Two principles of zero trust security are that all entities start
as low trust and least privilege access should be applied at all
times. In practice this means applying a whitelist approach to
policy creation. Specifically:
Defining access
Creating policies involves defining access parameters and
allowed connections between two entities. Parameters usually
include the user, role, protocol, and ports allowed for connec-
tions between the entities.
Depending on the zero trust security platform you are using,
you may be able to define access parameters using a table,
matrix, or visual policy editor.
Templates
Policy templates can greatly simplify the policy creation
process. For example, you might want to ensure that external
entities can access the front ends of three-tier web applica-
tions, but never access workloads in the business logic or
database tiers. If you capture the necessary rules in a template
you can apply the template to each new three-tier application
with only a few clicks, as shown in Figure 4-3.
Enforcing Zero
Trust Security
In this chapter
• Understand why observation comes before policy enforcement
• Explore best practices for turning on enforcement
• Learn about zero trust security for workloads, applications,
and endpoints
;; Suspicious
;; Unauthorized
Turn on Enforcement
Go zone by zone
When the observation period is complete, you can gradually
turn on enforcement one zone or use case at a time. For
example, you might want to start by protecting a high-value
application or by enforcing separation between development,
test, and production environments. A phased approach allows
you to catch mistakes, work the kinks out of the processes, and
show early successes. You can pick up the pace as you become
more proficient.
TIP Be prepared. Don’t forget to develop a problem reporting plan
and to alert your end users, technical support group, and IT
staff when you plan to start enforcing policies. Everyone needs
to know what to do if a misconfiguration causes a service
interruption. Fixing issues quickly to avoid disrupting busi-
ness must be the highest priority.
Whitelisting processes
We mentioned in the previous chapter that zero trust security
principles align with a whitelisting approach to network
access. The same idea can be applied to processes running on
individual endpoints. If you only allow authorized processes to
run, you reduce the risk of harm from malicious software.
Allowing only authorized processes to run:
Discovery
By analyzing application transaction information, zero trust
security platforms can discover and classify application
elements like databases, web front ends, files, and external
infrastructure services. In some cases, they can recognize enti-
ties within databases, such as individual tables.
Visualization
Zero trust security platforms map application elements and
their data flows. This mapping enables software developers
and security teams to understand the complete structure
and functioning of the applications, including APIs and code
paths. Analysts can use this information to identify vulner-
abilities, exposed elements, and areas where security controls
are weak.
Use Cases
In this chapter
• Explore the value of zero trust security platforms for 10 com-
mon use cases
Strengthening Compliance
Use cases relating to regulatory compliance often involve
multiple applications and data stores. Organizations may need
to protect complex cardholder data environments (CDEs),
electronic protected health information (ePHI), and person-
ally identifiable information (PII) stored in multiple locations.
Also, the costs of documenting compliance and passing audits
can be considerable.
Zero trust security platforms can safeguard sensitive data and
reduce the costs of compliance by:
Environmental Separation
Zero trust security can ensure that development environments
are more secure and more compliant with regulations. A
zero trust security solution can isolate code repositories and
prevent access to proprietary software by:
Protecting Microservices
Microservice architectures and containers allow development
teams to create software that is extremely modular, portable,
and easy to maintain. However, they can make it impossible to
enforce access control with conventional firewalls and ACLs.
Zero trust security platforms can track vast numbers of work-
loads in virtual environments and containers and ensure that
security policies move with them and are applied consistently.
Cloud Delivery
If your organization has migrated applications to the cloud,
you should look for a zero trust security platform that operates
on a cloud platform.
When application activity spikes, your cloud service provider
will quickly spin up more instances of the software to handle
the increased demand (that’s one of the reasons you moved
the application to the cloud). You need your security tools to
ramp up performance just as fast to protect the new instances.
Cloud delivery ensures that your zero trust security platform
can scale with your applications. Cloud hosting also eliminates
36 | Definitive Guide to Zero Trust Security
Scope of Capabilities
Zero trust security platforms should provide two core
capabilities:
1. Discovery and visibility (the subject of Chapter 3)
2. Micro-segmentation and policy enforcement (the focus of
Chapter 4)
However, as illustrated in Figure 7-1, some products go
beyond these core capabilities and add two more:
3. Endpoint protection and zero trust execution (discussed in
Chapter 5)
4. Application security and the prevention of web attacks
(also in Chapter 5)
Ease of Implementation
and Management
Discovery, mapping, and
policy creation tools
An organization may need to observe and manage hundreds
or thousands of resources on the corporate network and on
cloud platforms. That means it needs good tools and well-
designed user interfaces to simplify tasks such as discovering
and classifying entities on the network, grouping entities
based on common characteristics, creating connection maps,
and creating policies.
TIP Look for good visualization tools, dashboards, and mecha-
nisms for creating and using templates.
Ultra-lightweight agents
To simplify deployment and ongoing administration, a zero
trust security platform should offer ultra-lightweight agents
that are easy to install and don’t affect the performance of
endpoints and servers.
It is also advantageous if the agents support network micro-
segmentation, workload protection, endpoint protection,
and web application control, so that those functions can be
monitored through a single management console.
Of course, you will want to set these costs against the potential
savings from preventing expensive data breaches and reduc-
ing the effort required to manage firewalls, ACLs, and other
legacy security tools. The money you save from preventing
just one or two data breaches in a key application may be
enough to justify the entire zero trust security program.
Glossary