ZT Concept Content - Dennis
ZT Concept Content - Dennis
Dennis Moreau,
Sr Engineering Architect, Cybersecurity
VMware, Research and Innovation, Office of the CTO
©2020 VMware, Inc. 9/24/2021
Agenda What is Zero Trust and how does it work (to address supply chain
security, ransomware and complexity)?
PEP
Categorized Service
…
Comp Criticality <= Categorized Comp
PEP
PEP
PEP
PEP
PEP
PEP
…
…
PEP
PEP
ZT Policy
:= (Subjects, Objects, Risk)
Business Risk
Categorized Function
R …
User Trust Anchor Comp Criticality <= Categorized Comp ZT Ref Arch
PEP
Decoupling Bus Policy from Technology
R
Categorized Data
•DISA and NSA, Department of Defense (DOD) Zero Trust Reference Architecture Version 1.0
•NIST, SP 800-207, Zero Trust Architecture
•NSA, Embracing a Zero Trust Security Model
Aligned ZT Conformant Policy (EU) Aligned ZT Conformant Policy (GW) Aligned ZT Conformant Policy (SM)
(Subject, Object, Criticality/Importance) (Subject, Object, Criticality/Importance) (Subject, Object, Criticality/Importance)
©2020 VMware, Inc. 14
NSA Caveat on Partial ZTA Implementations (limited ZT protection)
When adding fractional ZT makes policy management less effective (NSA) Also see EO 10(k)
Enterprise Business aware ZT Policy
- Criticality Impact aware – real Risk
- Aligned from User To Enterprise Application
Conventional Policy Structure - Entitlement and Anomaly Informed
(Non-ZT)
Non-ZT Non-ZT
https://media.defense.gov/2021/Feb/25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_UOO115131-21.PDF
©2020 VMware, Inc. 15
CISA ZT Maturity Model (DRAFT - PC Opened 9/2021)
https://www.cisa.gov/sites/default/files/publications/CISA%20Zero%20Trust%20Maturity%20Model_Draft.pdf
[Page 2] Zero trust presents a shift from a location-centric model to a more data-centric approach for fine-grained
security controls between users, systems, data and assets that change over time; for these reasons, moving to a ZTA is
non-trivial. This provides the visibility needed to support the development, implementation, enforcement, and evolution
of security policies. More fundamentally, zero trust may require a change in an organization’s philosophy and culture
around cybersecurity. The path to zero trust is a journey that will take years to implement.
[Page 3] 6. Challenge The Federal Government faces several challenges in transitioning to ZTA. First, legacy systems rely
on “implicit trust”; this concept conflicts with the core principle of adaptive evaluation of trust within a ZTA. Additionally,
existing infrastructures are also built on implicit trust and must either be rebuilt or replaced. To rebuild or replace
information technology (IT) infrastructure and mission systems requires a significant investment on the part of agencies.
Lastly, there is no consensus on or formal adoption of a maturity model for ZTA. While proposals for maturity models
have been put forth, current initiatives for kickstarting zero trust adoption are often focused on the network layer and do
not present a holistic approach for transition
CB
CB
CB
ZT Policy Expression
• PEP Policy Deployment
• Subjects, Objects
Container Granularity
Containment/Isolation Intentional Classification of
App Trust Anchor Sensitivity
Subject Trust Anchor
Object Trust Anchor
Zero Trust cited in 10 separate audit controls for the compliant and
certifiable operation of “Critical Software”. ZT is not just a product
capability for customers, it is also the kind of policy that is expected
to constrain thecutomer’s operation of our platform.
https://www.nist.gov/system/files/documents/2021/07/09/Critical%20Software%20Use%20Security%2
0Measures%20Guidance.pdf
The National Institute of Standards and Technology’s (NIST) National Cybersecurity Center of Excellence (NCCoE) has named 18 firms it will work with on NCCoE’s
Implementing a Zero Trust Architecture Project.
The 18 companies – all of whom answered a public call for collaborators and entered a related cooperative research and development agreement with NCCoE – will work
with the organization to demonstrate approaches to implementing zero trust architectures designed and deployed according the concepts and tenets in NIST’s Special
Publication (SP) 800-207 on Zero Trust Architecture.
The goal of the project is to produce a publicly available NIST Cybersecurity Practice Guide that shows the practical steps to implement the cybersecurity reference designs.
Natalia Martin, NCCoE’s acting director, said the center received “an overwhelming response from the vendor community on this important project.”
“Implementing a zero trust architecture has become a Federal cybersecurity mandate and a business imperative,” she said. “We are excited to work with industry
demonstrating various approaches to implementing a zero trust architecture using a diverse mix of vendor products and capabilities, and share how-to guidance and
lessons learned from the experience.”
The 18 firms are: Amazon Web Services, Inc.; Appgate; Cisco Systems, Inc.; F5 Networks, Inc.; FireEye, Inc.; Forescout Technologies, Inc.; International Business Machines
Corporation (IBM); McAfee Corp.; Microsoft Corporation; MobileIron, Inc. an Ivanti Company; Okta, Inc.; Palo Alto Networks; PC Matic, Inc.; Radiant Logic, Inc.; SailPoint
Technologies, Inc.; Symantec, a Division of Broadcom; Tenable, Inc.; and Zscaler, Inc.
“Zero trust is a team sport and the NIST NCCoE is taking the initiative to bring together best-of-breed zero trust leaders,” commented Stephen Kovac, Vice President of
Global Government and Head of Corporate Compliance at Zscaler.
“We are all committed to collaborating and demonstrating different, practical approaches to implement a zero trust architecture,” he said. “As we know, no one solution fits
every situation. Zscaler is honored to be a part of this coalition working side by side to realize the opportunity for zero trust to strengthen every agency’s cyber defenses.”
“Cisco is happy to be a National Center of Excellence Partner (NCEP) of NCCoE since the beginning and are proud to continue contributing to their SP 1800 documents,”
said Peter Romness, Cybersecurity Principal, U.S. Public Sector CTO Office, at Cisco. “These publications are used by governments and businesses around the world has
guides to implement their own cybersecurity capabilities.”
“Zero Trust is a hot topic and our customers are looking for guidance from an impartial, trusted source like NIST,” he said. “Their SP 800-207 – Zero Trust Architecture, is
already being used to understand zero trust. This new project will show examples of how to implement zero trust. We’re thrilled we were selected to help.”
Scenario 1: Employee Access to Corporate Resources An employee is looking for easy and secure access to corporate resources, from
any work location.
Scenario 2: Employee Access to Internet Resources An employee is trying to access the public internet to accomplish some tasks.
Scenario 3: Contractor Access to Corporate and Internet Resources A contractor is trying to access certain corporate resources and
the internet.
Scenario 4: Inter-server Communication Within the Enterprise Corporate services often have different servers communicating with
each other. For example, a web server communicates with an application server.
Scenario 5: Cross-Enterprise Collaboration with Business Partners Two enterprises In this scenario, the ZTA solution implemented in
this project will enable users from one enterprise to securely access specific resources from the other enterprise, and vice versa.
Scenario 6: Develop Trust Score/Confidence Level with Corporate Resources. . In this scenario, a ZTA solution will integrate these
monitoring and SIEM systems with the policy engine to produce more precise calculation of trust scores/confidence levels in near
real time.
ZT Leverages DevSecOps
Mitigate Appetite
CJA
RiskMap STIX
The Platform Role: Governance
CyBOX
Zero Trust + Supply Chain + Dev… Assess Classify
D3FEND
Risk Assessment:
Monitor
Policy: e.g. OSCAL, CRMF SCAPv2
SCAPv2 e.g. NIST Zero TrustBus/Mission Objective Bus/Mission Objective
SP 800-207 • Policy • Performance
InSPEC • Criticality • Compliance ATT&CK
• Classification • Incident
SP 800-161 • Investment • Impact
NIST SP 800-171 CUI, NIST SP
Mitigate
Risk
Appetite Application/Service Artifacts 800-172 CUI Enh.
Platform ID, Dep, Meta Threat
• Observation Alerts Respond Intel
• Signatures
• Ops Context
• Diagnostic Forensics • Severities
Technical:
• Enforcement of strong Authentication and
Access Controls
• Establishes CVE and related standards &
coordination agreements to other CVE-based
registries
• Establishes top level DNS mandate
• Zero Trust – Priority 7 - ENISA
https://www.nccoe.nist.gov/sites/default/files/library/project-descriptions/zta-project-description-
final.pdf
Granular Isolation
©2020 VMware, Inc. NSA: Container level at least.` 36
ZT Direction: ZT in Audit
200,000 Auditors : One ZT Definition
What is Zero Trust and how does it work (to address supply chain security, ransomware and complexity)?