版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
TowardaZeroTrustArchitecture
AGuidedApproachforaComplexandHybridWorld
?2021CloudSecurityAlliance–AllRightsReserved.Youmaydownload,store,displayonyourcomputer,view,print,andlinktotheCloudSecurityAllianceat
subjecttothefollowing:(a)thedraftmaybeusedsolelyforyourpersonal,informational,non-commercialuse;(b)thedraftmaynotbemodifiedoralteredinanyway;(c)thedraftmaynotberedistributed;and(d)thetrademark,copyrightorothernoticesmaynotberemoved.YoumayquoteportionsofthedraftaspermittedbytheFairUseprovisionsoftheUnitedStatesCopyrightAct,providedthatyouattributetheportionstotheCloudSecurityAlliance.
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 2
Abstract
Enterprisestakeholdersmustconsiderthechallengesofincreasedreal-timesystemcomplexity,theneedfornewcybersecuritypolicy,andthestrongculturalsupportthatisrequiredtosecurelyoperatesystemsinacomplexandhybridworld.EmergingtechnologysolutionsandapproachessuchasZeroTrustarecriticaltomeetingthemandatesinUnitedStatesPresidentBiden’sExecutiveOrder14028,ImprovingtheNation’sCybersecurity.Theimplicationsofanemerging,rich,anddiversesolutionslandscapeandthechallengestoanorganization’sabilitytoultimatelydeliveraZeroTrustarchitecture(ZTA)areexploredinthispaper.Recommendationsarediscussedforhowindustrycanimprovecollaborationamongkeystakeholdergroupstoacceleratebothenterpriseleaders’andsecuritypractitioners’adoptionofZeroTrustintotheirenvironments.
AProductoftheCloudSecurityAlliance–WashingtonDCChapter(CSA-DC)ResearchCommitteeResearchCommitteeChair:MariSpina
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 3
Acknowledgments
Authors:
JuanitaKoilpillai
JyotiWadhwa
Dr.AllenHarper
SalilParikh
PaulDeakin
VivianTero
GregBateman
AubreyMerchant-Dest
JayKelley
PhyllisThomas
UmaRajagopal
RebeccaChoynowski
Contributors:
JasonKeplinger
TomStilwell
LaurenBogoshian
BobKlannukarn
JoeKlein
DanieleCatteddu
NirenjGeorge
JaganKolli
AndresRuz
SpecialThanks:
BowenClose
AbouttheCSADCChapter
ThisdocumentwascreatedbytheDCchapteroftheCloudSecurityAlliance(CSA).TheDCChapteroftheCSAconsistsofvolunteerswhohavebeenattheforefrontofcloudsecurity.Visitourwebsiteat
/
formoreinformation.
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 4
Dedication
ThispaperisdedicatedtoJuanitaKoilpillai,whosesuddenandunexpecteddeathmarkedagreatlossforthecybersecuritycommunityandherCSA-DCChapterfriends.JuanitawasaprimaryauthorandcontributortothispaperandtheCSA-DCChapterworkinggroupthatproducedit.Juanita’scontributionstocybersecuritywillcontinueinherstead,strengtheningthecybersecuritypostureoforganizationsaroundtheworld.HertechnicalleadershipanddevelopmentofSoftware-DefinedPerimeter(SDP)technologiesformedtheearlyfoundationsofZeroTrustarchitectures(ZTAs).Juanitawasatruelightthatshonebrightlyacrossthecybersecuritycommunity.Itiswithgreatsadnesswebidfarewelltoatrulygreatleaderandengineer.
AnilKarmel
President,CSA-DCChapter
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 5
TableofContents
Abstract 3
Acknowledgments 4
Dedication 5
1Background 7
1.1WhyZeroTrust? 7
1.2AssessingtheCurrentZeroTrustMaturityLevel 9
1.3DevelopingaZeroTrustRoadmap 10
2ConsiderationsforZeroTrustAdoption 14
2.1Technology 14
2.2OrganizationalCulture 15
2.3Policy 15
2.4RegulatoryEnvironment 15
3ZeroTrustSolutionLandscape 17
3.1Software-DefinedPerimeter 17
3.2NetworkSegmentation 18
3.3ServiceMesh 19
3.4EdgeComputing 20
3.5PolicyasCode 20
3.6IdentityAwareProxy 22
4ImplicationsforIndustry 23
4.1Technology 23
4.2OrganizationalCulture 24
4.3Policy 24
4.4RegulatoryEnvironment 25
5Recommendations 26
6AdditionalReading 28
7References 29
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 6
1Background
DuetotheCOVIDpandemic,organizationshavehadtoquicklyadapttosupportingaglobalremoteworkforce.Theexpansionofremoteworkandtheadoptionofcloudtechnologieshaveextendedthedefinitionofthesecurityperimeter,necessitatingadoptionofaZeroTrust(ZT)strategytosecurethefutureofwork.Combinedwiththeongoingshifttomoreagileandscalablemulti-cloud,hybridarchitectures,theseforceshaveacceleratedmorethaneverbeforetheneedtoimprovethesecurityandriskmanagementofinformationsystems.ITorganizationsarenowbeingdriventoprioritizetheirfocusondefiningandadoptingaZeroTrustarchitecture(ZTA)uniquetoitsenvironment.
TheadoptionofaZTAisfurtherpromotedbytherecentPresidentialExecutiveOrdermandatingimprovementstothenation’scybersecurity1andtheFederalZeroTrustStrategy.2
Withperimeter-basedanddefense-in-depthapproachesgivingwaytothisnewersecurityparadigm,enterprisesareseekingtoreducesecurityrisks,especiallyastheybegintoadoptmodernmicroservice,microsegmentation,andsoftware-definedarchitecturesthatenableremoteproductivity.AlthoughthereisbroadsupportfromITvendors,therealityofZTAisstillanambitiousfuturetargetstatebecauseorganizationsarejustbeginningtoformulatebaselinesfortheirZTAapproachandtheindustryisseekinginsightstoformbestpracticesorstandardsthroughongoingcollaborations.
Thispaperwillhelpinformcybersecuritypractitioners,engineers,architects,businessleaders,andITstakeholders.Althoughbroadlyuseful,thispaperfocusesonaU.S.governmentperspective.Asaresult,ageneralfamiliaritywithNISTSP800-207isimplied.
1.1WhyZeroTrust?
TheZTmodelofinformationsecuritywasintroducedbytheJerichoProjectin2003,recognizingthesecuritychallengesoftraditionalperimeternetworking,followedin2009(publiclyavailablein2014)byGoogle’sBeyondCorpproject—theirimplementationofZT—andthenbyForresterResearchin2010.TheZTmodel“eliminatestheideaofatrustednetwork”andteachesthat“inZeroTrust(ZT),allnetworktrafficisuntrusted.Thus,securityprofessionalsmustverifyandsecureallresources,limitandstrictlyenforceaccesscontrol,andinspectandlogallnetworktraffic.”3In2019,NISTauthoredaSpecialPublicationonZeroTrustArchitecture4(SP800-207)thatmeldsZTideasintoanabstractdefinitionofZTAandpresentsguidingtenetsfordevelopmentandimplementationof
Exec.OrderNo.14208,86FR26633(May12,2021).
/briefing-room/
presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/
U.S.OfficeofManagementandBudget.(n.d.).FederalZeroTrustStrategy.Cybersecurity&InfrastructureSecurityAgency.RetrievedSeptember29,2021,from
/
federal-zero-trust-strategy/
Kindervag,J.(2010,September17).NoMoreChewyCenters:IntroducingtheZeroTrustModelofInformationSecurity.PaloAltoNetworks.
/documents/
Forrester-No-More-Chewy-Centers.pdf
Rose,S.,Borchert,O.,Mitchell,S.,&Connelly,S.(2020,August11).SP800–207,ZeroTrustArchitecture.NIST.
/publications/detail/sp/800-207/final
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 7
ZTA;illustratedinFigure1.IndustrydynamicsdrivingtheadoptionofanewZTsecuritylandscapeincludeexplodingsecuritycost,broaduseof5G,cloudcomputing,theInternetofThings(IoT),andmicroservice-orientedarchitectures.Thesefactorscontributetoredefiningownershipboundariesandusagepatternsbydiminishingtheprominenceoffixedphysicalorsoftware-definednetworkboundaries.
ZeroTrustTenetsfromNIST
1Alldatasourcesandcomputingservicesare“resources”
2Communicationsaresecuredregardlessoflocation
3Accesstoindividualresourcesisgrantedonaper-sessionbasis
4 Accesstoresourcesisdeterminedbydynamicpolicyandotherbehavioralandenvironmentalattributes
5 Integrityandsecuritypostureofownedandassociatedassetsismonitoredandmeasured
Dynamicresourceauthenticationandauthorizationarestrictly
enforcedbeforeaccessisallowed
7 Informationoncurrentstateofasset,networkinfrastructure,andcommunicationsiscollectedtoimprovesecurityposture
Figure1.ZeroTrustTenets,NISTSP800-207
Asorganizationscontinuetomigrateallorpartsoftheirnetworktothecloud,stakeholdersatgovernmentagenciesandcommercialenterprisesmustsecuretheirprivate,public,orcommunitycloudinstancesinanewway.Althoughtheneedisimminent,thischangeinthesecuritylandscapewilltaketimeandintentiontoimplement.Organizationswillneedtoadvancetheirabilitytosecuretheirsystemsinthecloudwithnewtechnologystacks,skillsets,andprocesses.Thispresents
achallengeofdevelopingnewsecuritygovernanceandpoliciesthatarebasedoncontinuousverification,microsegmentation,software-definednetworks,andcontinuousmonitoringandvisibility.Implementingandenforcingthesemodernizedpolicieswillrequireindustryplayerstodesignandoperateacomplexmixofbothtraditionalandmodernaccesscontrolandnetworktechnologies,customizedtotheirownenvironmentovertime.
Commonlydeployedapproaches,suchasalways-onVPNconnectionsandroutingalltrafficthroughenterprisegateways,havebecomelessefficientornolongerviablefromacostanduserexperience
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 8
perspective.Furthermore,muchofcybersecurityisbasedonasignature-basedconcept,wherebytoolslookfor“signatures”ofknownbadbehavior,butbydefinitionazero-daythreatdoesnothaveaknownsignature.ThislimitationisaddressedbyZT,sinceZTAsdonotrelyonsignature-oranomaly-basedtechnologiestohelpreducerisk.WithZT,securitycontrolsarepervasiveandrightlytrendingclosertotheactualdataandfunctions,whereverandwhenevertheyareinstantiated.However,giventhedisparityintherateandlevelofmodernizationamongorganizations,thespeedandmaturityofindustryguidanceonhowtosecurethesemodernarchitectureshasfallenbehindandisatbesttoouncoordinatedforoptimalprotectionofsystemsandtheirdata.
MaturityforZTsolutionsandroadmapsisjustbeginning,givenarchitectureandmarketplacecomplexity.Forexample,securitypractitionersarechallengedwithidentifyingusersandimplementingautomateddetectionofnewcyberthreatsinreal-time,multi-cloudenvironments.Giventoday’ssophisticatedandhybridlandscape,thispaperproposesfoundationalelementsofaZeroTrustArchitectureCapabilityMaturityModel(ZTA-CMM)andisassociatedwithaZTroadmap.OngoinggovernmentandindustrydialogandcollaborationwillaidinthedevelopmentofZTA-CMMbestpracticestoassesshowZTprinciplesareappliedtocurrentarchitecturesandthecorrespondingZTroadmapthataddressesthegaps,yieldingimprovedriskmanagementandcyberresiliency.
1.2AssessingtheCurrentZeroTrustMaturityLevel
AnorganizationmustunderstandthecurrentmaturitylevelofitsZTA,engaginginorganization-widereviewstoconductathoroughandefficientanalysis.Thisanalysisshouldaccountforthecurrentpeople,processes,andtechnologiesinplacethatcontributetotheZTpillars.Thoughfocused
onfederalagencies,theCISAFederalZeroTrustStrategy5documentcanoperateasaguideforunderstandingtheprocessesandtechnologiesthatarevitalforasuccessfulZTAimplementation.ConceptualmodelsandframeworksarebeingidentifiedbytheNationalInstituteofStandardsandTechnology(NIST)andindustrystakeholders6suchasACT-IAC7andForrester,8andwillcontinuetoevolve;however,itshouldbenotedthatatthistimethereisnoefforttobringtheseframeworkstogether.CISAhasreleasedaZTCMM9composedofthefollowingpillars:identity,devices,networks,applicationsworkloads,anddata.Together,thesefivecomponentsprovideaholisticperspectiveonthedifferentareaswhereanorganizationcanapplyresourcestowardsthedevelopmentofitsZTA.
U.S.OfficeofManagementandBudget.(n.d.).FederalZeroTrustStrategy.Cybersecurity&InfrastructureSecurityAgency.RetrievedSeptember29,2021,from
/
federal-zero-trust-strategy/
Microsoft.(n.d.).ZeroTrustModel-ModernSecurityArchitecture.RetrievedSeptember29,2021,from
/en-us/security/business/zero-trust
AmericanCouncilforTechnology-IndustryAdvisoryCouncil.(2019,April18).ZeroTrustCybersecurityCurrentTrends.
/system/files/ACT-IAC%20Zero%20
Trust%20Project%20Report%2004182019.pdf
Forrester.(n.d.).TheZeroTrustSecurityPlaybookFor2021.RetrievedSeptember29,2021,from
/playbook/The+Zero+Trust+Security+Playbook+For+2020/-/E-PLA300
CybersecurityandInfrastructureSecurityAgency,CybersecurityDivision.(2021,June).ZeroTrustMaturityModel-Pre-decisionalDraft,Version1.0.CybersecurityandInfrastructureSecurityAgency.
/sites/default/files/publications/CISA%20Zero%20Trust%20
Maturity%20Model_Draft.pdf
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 9
PillarsofaZeroTrustArchitecture(DHSCISACMM)
Inacomplexhybridandmobileenvironment,theidentitystoreofallactorsmaybemaintainedinafederatedactivedirectory,backedwithapublickey
Identity infrastructure(PKI).Further,theorganizationmayleverageaseparateidentitymanagementsolutionwhichmayormaynotbefullyintegratedwiththefederatedactivedirectoryservice.
Device
Networks
Application
Workload
Data
Anorganization’sendpointsmaybecomprisedofandnotlimitedtotraditionalservers,desktops,laptops,VDIinstances,thinclients,mobiledevices,InternetofThings(IoT)devices.
Networksincludetraditional,wireless,mobile(5G,Zigbee,etc.),cloud,andsoftware-definednetworks,forexampleinHyperConvergedInfrastructure(HCI).Micro-segmentationisestablishedatthenetworkandapplicationlevels.
Anorganization’sapplicationworkloadsorplatformtosupportthoseworkloadsmaybefromathirdpartyand/ordevelopedbytheorganization.Thisincludestheapplicationandtheplatforms,containers,andserversusedtosupporttheapplications.
Datamaybethebusinessdatacollectedbyandutilizedbytheorganizationtoconductbusiness,butalsomayincludedatalakesrequiredtomaintainvisibility.
Figure2.ZeroTrustPillars,DHSCISAZT-CMM
AZTA-CMMprovidesinsightsintothematuritylevelofeachpillar(showninFigure2).Gainingadeepunderstandingofeachareahelpstoinformorganizationalstakeholdersabouttheirenvironment’suniquestrengthsandgapsregardingtheadoptionofaZTA.Currently,organizationsarelimitedinleveragingawidelyacceptedZTmaturitymodelforZTAassessments,whichisagapinindustryguidanceandanareathatwilllikelystimulateindustrycollaborationontherankingsandlevelsoftheZTA-CMM.Intheinterim,individualorganizationswilllikelymoveforwardwithinitialassessmentsandtheresultsofthosefirstassessmentswillbecomethebaselineassessmentoftheorganization.
1.3DevelopingaZeroTrustRoadmap
AsorganizationsgainmoreinsightintothecurrentstateoftheirZTAmaturitylevel,theycanidentifyandincorporateintotheirarchitecturenewsolutionsthataddressthegapsandadvancetheirmaturity.Forexample,theDHSCISAZTCMM(DHSCISA)usesthreelevels:traditional,advanced,andoptimal,asshowninFigure3.
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 10
Traditional
Advanced
DHSCISAZeroTrustMaturityModel
Identity
Device
Network/
Application
Data
Environment
Workload
Passwordor
Limitedvisibility
Largemacro-
Accessbasedon
Notwell
multifactor
intocompliance
segmentation
localauthorization
inventoried
authentication
Simpleinventory
Minimalinternal
Minimal
Staticcontrol
(MFA)
orexternaltraffic
integrationwith
Unencrypted
Limitedrisk
encryption
workflow
assessment
Somecloud
accessibility
VisibilityandAnalytics
AutomationandOrchestration
Governance
MFA
Compliance
Definedby
Accessbased
Leastprivilege
Someidentity
enforcement
ingress/egress
oncentralized
controls
employed
micro-perimeters
authentication
federation
Datastoredin
withcloudand
Dataaccess
Basicanalytics
Basicintegration
cloudorremote
on-premises
dependsondevice
intoapplication
environmentsare
systems
postureonfirst
workflow
encryptedatrest
access
VisibilityandAnalytics
AutomationandOrchestration
Governance
Optimal
Continuous
validation
Real-timemachinelearninganalysis
Constantdevice
Fullydistributed
Accessis
Dynamicsupport
securitymonitor
ingress/egress
authorized
Alldatais
andvalidation
micro-perimeters
continuously
encrypted
Dataaccess
Machinelearning-
Strongintegration
dependsonreal-
basedthreat
intoapplication
timeriskanalytics
protection
workflow
Alltrafficis
encrypted
VisibilityandAnalytics AutomationandOrchestration Governance
Figure3.CISAZT-CMM,(DHSCISA)
Achievingthetargetedmaturitylevelissupportedbyevaluatingtheorganization’scurrentmaturitylevelandpromptingstakeholderstousethatevaluationtoidentifypriorityareasforexecution,resourcerequirements,andbudgetallocationoveradefinedtimelinetoachievethetargetedmaturitylevel.TargetedmaturitylevelsinadvancedenvironmentsthatalreadyreflectahighdegreeofZTapproachesintheirarchitecturewillbemuchhigherrelativetoorganizationsthatarestartingtheirsecurityandITmodernizationjourney.ToaddresstherequirementsofaZTAroadmap,stakeholderswillneedtogainabetterunderstandingofanevolvingtechnologylandscaperepresentingmodernopportunitiestoattaintargetedmaturitylevels.
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 11
Thisbeginswithcompletingamaturityassessmentoftheorganization’scapabilitiesacrosseachofthefivepillars.Foreachpillar,severalquestionsmaybedevelopedsothatrelevantstakeholdersprovideaholisticassessmentofthelevelofmaturityineachfocusarea.ThesequestionswouldincreaseinthedegreeofdifficultyandscopetoresultinamorematureaspectofZTinthatpillar.Aftercompletingthequestionnaire,theorganizationmayleveragethequantifiedresultsasabaselineassessmentoftheorganization’scurrentZTAmaturity.Maturitylevelcanbemeasuredandquantifiedusinganorganization’srubric,similartotheapproachsuggestbytheCMMC10andrepresentedinaspiderdiagram,asnotionallyillustratedinFigure4,alongsideadesiredortargetstateofZTmaturityfortheorganization.
Figure4.ZeroTrustMaturitySpiderDiagram(notional)
Theresultingdifferentialinthebaselineandtargetpointsisthegapassessment.ThegapassessmentincludesspecificareasforeachpillarthattheZTRoadmapwilladdresstomethodicallyandgraduallyimprovethecurrentstatetothetargetstateoveronetothreeyears.
CMMCInformationInstitute.(2021,August21).DoD/NISTSP800–171BasicSelfAssessmentScoringTemplate.
/cmmc-info-tools/dod-nist-sp-800-171-basic-self-
assessment-scoring-template/
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 12
YearOne YearTwo YearThree
Identity
Device
Prioritizedinvestmentandallocationof
Networks resourcesacrosseachpillarbasedongapassessmentfindings
Application
Workload
Data
Figure5.ZTPrioritizedInvestmentRoadmap(notional)
ThisapproachyieldsaZTprioritizedinvestmentroadmap,assuggestedinFigure5.Itshouldincorporatetheuseofindustrybestpracticesandframeworks,suchastheNISTSpecialPublication(SP)800series,CSACloudControlsMatrix(CCM),orgovernmentSecurityTechnicalImplementationGuides(STIGs),astheypertaintoeachpillar.Thiswillhelpguideorganizationsonthedetailedprocessandtechnologyrequirementsthataremissingfromtheircurrentstateinordertoachievetheirdesiredmaturityleveloveronetothreeyears.Thisapproachispresentedasanexample
ofwhatispossibleanditmaybecustomizedforeachorganization.FutureworkinggroupsandorganizationsmaydevelopastandardsetofprescriptivequestionsandgraphicsdescribingcapabilitymaturitylevelsforaholisticapproachtoadoptingaZTA.
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 13
2ConsiderationsforZeroTrustAdoption
InadditiontoZTmaturityassessmentandroadmapconsiderations,thefollowingfourfactorsareimportantconsiderationstodevelopingaZTA:technology,organizationalculture,policy,andregulatoryrequirements.Theseinternalandexternalfactorsinfluenceanorganization’sabilitytounderstand,design,andimplementaZTAroadmapfortoday’scomplexandhybridenvironments.TheyhelpstakeholdersidentifywhichvariablesaresignificantbarriersoracceleratorsintheircurrentmaturitylevelofZTAandwhichonesmosthelptoadvancetheirZTAjourney.
OneessentialstepinZTAadoptionwillbetheinventoryofpeople,processtechnology,criticalassets,andsecuritycontrols.Thisiskeytoadoptingthearchitecturesuccessfully.NISTrecommendsthatyoustartwithasingleprocessandcontinuetheorganizationjourneyinthedeploymentofthearchitecture.
OrganizationsshouldtargetquickwinsandunderstandthatadoptionofaZTAisalonger-term,strategicinitiative.Assuch,itrequiresexecutivesupportandongoingconsiderationofallthesefactorsoverthreetofiveyears.Acapabilitymaturitymodelcanguideanorganizationthroughajourneytounderstandexistingandlegacycapabilitieswhilesuggestingappropriatequestionstoaskandseekanswersto.Forexample,questionscouldaddress:
Whatarethelegacytechnologiesusedbytheorganization?
Whattypeofdata/servicesaretheyusing?
Whatarethespecificcloudservicesimplemented?
Isthereacloudaccesssecuritybrokersolutionimplemented?
Howareidentitiesmanagedandwhattoolsareimplemented?
Inwhichphaseofthecloudadoptionjourneyistheorganization?
However,questionsshouldbetailoredtotheorganization’sparticularbusinessandmission.Eachshouldaddresstheorganization’sbusinesslandscapeassociatedwiththestateoftechnology,itsorganizationalculture,itsoperatingpolicies,theregulatoryenvironmentinwhichitoperates,andthecloudsecurityarchitecturetowardswhichtheorganizationisheaded.Forfederalagencies,thisisspelledoutinCISA’sCloudSecurityTechnicalReferenceArchitecture.11
2.1Technology
Technologicalconsiderationsarecritical.Legacytechnologysolutionshavecenteredaroundaddinglayerstotheperimeter,butthisperimeter-basedapproachhasbeenunabletocontaintheever-increasingdiversityandnumberofattacksonourITsystems.Computingunitsforapplicationdeliveryhavetransitionedfromconcentratedbig-ironserverstonumerousvirtualizedservers
CybersecurityandInfrastructureSecurityAgency.(n.d.).CloudSecurityTechnicalReferenceArchitecture.RetrievedSeptember29,2021,from
/cloud-security-
technical-reference-architecture/
?Copyright2021,CloudSecurityAlliance.Allrightsreserved. 14
andservicestohighlygranularcontainersdistributedacrossalandscapeofcloudproperties.TheatomizationoffunctioncreatesportabilitychallengesfortheapplicationofZT;however,givenincreasedcloudadoptionratesaspartofdigitaltransformationinitiatives,ZTrepresentsthenextevolutionandamoderncyberapproachtopreventionofandresiliencytowardcyber-attacks.Anorganization’sskillwithkeycapabilitiessuchasidentityandcredentialaccessmanagement(ICAM),software-definednetworks(SDN),microsegmentedenvironments,Identity-AwareProxies(IAPs),andtheabilitytocontinuouslymonitorsystemswilldrivethetransitiontoZT.Understandingthetechnologylandscapeinyourarchitectureandtheoptionsavailableinthemarketecosystemwillinfluencetherightsolutionforyourenvironment.
2.2OrganizationalCulture
Anorganization’scultureisanotherstronginfluenceforallstakeholderstoconsider.TheCOVID-19pandemichasproventobeacatalystpushingorganizationsintowork-from-homeprogramsandsecurityteamstoprogresstowardsaZTstrategy.ToadoptZT,theorganizationmustbewillingtochangeandfostera“trustnoone”approachthroughenterprisere-engineering.Proactiveorganizationsembracingscalablecloudandhybridmodelsoverlegacyenvironmentsareatanadvantageandwillbeabletomoreeasilyadoptthe“ZTmindset.”Understandingyourcultureandchangemanagementcapabilityisessential.
2.3Policy
Alongwithculture,theabilityforanorganizationtoupdateitspoliciesisalsocritical.ThemodernITorganizationisasophisticated,complex,hybridmixofon-premisesandcloud-hostedarchitecture,whichcanmakeanorganization’scybersecuritycontrolpolicieschallenging.Theimpactofchangingpoliciespermeatesacrossanorganization’sentireinfrastructure,applications,anddata.TheabilitytoidentifyanddevelopnewZT-basedpoliciesisanimportantfactoranduniquetoeachorganization.Organizationsmaybechallengedtoidentify,create,andformalizethesepolicies,giventheimmaturityofZTAs.
2.4RegulatoryEnvironment
AfinalinfluencehighlightedintheadoptionofZTistheregulatoryenvironment.TheU.S.Governmenthastwoprimaryframeworksthatdrivecybersecuritycompliance:theRiskManagementFramework(RMF)12andCybersecurityFramework(CSF),administeredbyNIST.Theyprovideguidanceonsecurityassessment,implementation,authorization,andmonitoring.PresidentialExecutiveOrder13636ImprovingCriticalInfrastructureCybersecurity,13issuedonFebruary12,2013,establishedaframeworkbasedonexistingstandards,guidelines,andpracticesforreducingcyber
SecuriconTeam.(2019,October8).NIST800–53Rev.5:WhatitIs,andWhyYouShouldCare.Securicon.
/nist-800-53-rev-5-what-it-is-and-why-you-should-care/
Exec.OrderNo.13636,78FR11737(February12,2013).
/
the-pr
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年民生銀行蘭州分行社會招聘備考題庫含答案詳解
- 2025年防城港市生態(tài)環(huán)境局招聘備考題庫及參考答案詳解
- 2025年能源產(chǎn)業(yè)十年分析:風能利用與能源存儲報告
- 2025年陶瓷釉料五年藝術(shù)裝飾專利分析報告
- 成都農(nóng)商銀行關(guān)于2025年產(chǎn)業(yè)金融崗社會招聘的備考題庫及答案詳解參考
- 2026四川廣元市昭化區(qū)元壩鎮(zhèn)人民政府招聘城鎮(zhèn)公益性崗位人員23人模擬筆試試題及答案解析
- 2025年北京協(xié)和醫(yī)院心內(nèi)科合同制科研助理招聘備考題庫及一套答案詳解
- 2025鞍山臺安縣教育系統(tǒng)面向師范類院校應(yīng)屆畢業(yè)生校園招聘13人筆試重點題庫及答案解析
- 2025山東勞動職業(yè)技術(shù)學院招聘8人筆試重點試題及答案解析
- 2025年光澤縣縣屬國有企業(yè)專崗招聘退役軍人2人考試核心試題及答案解析
- GB/T 27806-2011環(huán)氧瀝青防腐涂料
- GB/T 2624.1-2006用安裝在圓形截面管道中的差壓裝置測量滿管流體流量第1部分:一般原理和要求
- GB/T 12618.1-2006開口型平圓頭抽芯鉚釘10、11級
- FZ/T 52051-2018低熔點聚酯(LMPET)/聚酯(PET)復合短纖維
- 設(shè)備吊裝方案編制受力計算
- 食品工程原理概述經(jīng)典課件
- 養(yǎng)老院機構(gòu)組織架構(gòu)圖
- 財經(jīng)法規(guī)與會計職業(yè)道德
- 會計學本-財務(wù)報表分析綜合練習
- 傳播學概論教學課件
- 《中國傳統(tǒng)文化心理學》課件第五章 傳統(tǒng)文化與心理治療(修)
評論
0/150
提交評論