| |
|
<<Security Requirement>> Zero Trust Requirements |
Resource Protection |
| |
|
<<Security Requirement>> Zero Trust Requirements |
Continuous Monitoring |
| |
|
<<Security Requirement>> Zero Trust Requirements |
Users |
| |
|
<<Security Requirement>> Zero Trust Requirements |
Network |
| |
|
<<Security Requirement>> Zero Trust Requirements |
User Devices |
| |
|
Resource Protection |
<<Asset at Risk>> Application |
| |
|
Resource Protection |
<<Asset at Risk>> Reputation |
| |
|
Resource Protection |
<<Asset at Risk>> Data |
| |
|
<<Asset at Risk>> Data |
<<Security Requirement>> Encrypt all end-to-end communication |
| |
|
<<Asset at Risk>> Data |
<<Security Requirement>> Label data to distinguish sensitive from non-sensitive data |
| |
|
<<Asset at Risk>> Data |
<<Security Requirement>> Encrypt sensitive data at rest |
| |
|
<<Asset at Risk>> Data |
<<Security Requirement>> Identify and catalogue all data resources |
| |
|
<<Asset at Risk>> Application |
<<Security Requirement>> Implement micro-segmentation to isolate applications and workflows |
| |
|
<<Asset at Risk>> Application |
<<Security Requirement>> Implement resource obfuscation |
| |
|
<<Asset at Risk>> Application |
<<Security Requirement>> Secure application development |
| |
|
<<Asset at Risk>> Application |
<<Security Requirement>> Identify and catalogue all Applications and Services |
| |
|
<<Asset at Risk>> Application |
<<Security Requirement>> Software assurance and supply chain risk management |
| |
|
<<Asset at Risk>> Application |
<<Security Requirement>> Automation and orchestration |
| |
|
Continuous Monitoring |
Security Visibility and Real-time Threat Protection |
| |
|
Security Visibility and Real-time Threat Protection |
<<Security Requirement>> Traffic flow inspection and analysis |
| |
|
Security Visibility and Real-time Threat Protection |
<<Security Requirement>> Security Information and Event Management (SIEM) |
| |
|
Security Visibility and Real-time Threat Protection |
<<Security Requirement>> Traffic flow inspection and analysis |
| |
|
Security Visibility and Real-time Threat Protection |
<<Security Requirement>> Real-time correlation, assessment and response based on inputs from multiple sources (including data from automated monitoring tools) |
| |
|
Users |
Identification and Authentication |
| |
|
Users |
Privilege Management |
| |
|
Users |
Access Control |
| |
|
Users |
Consent Management |
| |
|
Identification and Authentication |
<<Security Requirement>> Centralized authentication |
| |
|
Identification and Authentication |
<<Security Requirement>> Comprehensive Identity, Credential and Access Management (ICAM) |
| |
|
Identification and Authentication |
<<Security Requirement>> Strong two-factor authentication (2FA) for all users, regardless of location |
| |
|
Privilege Management |
<<Security Requirement>> Associate roles/group memberships with each user |
| |
|
Privilege Management |
<<Security Requirement>> Establish roles/group memberships |
| |
|
Privilege Management |
<<Security Requirement>> Add/remove memberships as required |
| |
|
Access Control |
<<Security Requirement>> Implement fine-grained, least privilege access control |
| |
|
Access Control |
<<Security Requirement>> Implement effective user account management procedures |
| |
|
Access Control |
<<Security Requirement>> Risk Adaptive Access Control |
| |
|
Network |
Network Device and Infrastructure Protection |
| |
|
Network Device and Infrastructure Protection |
<<Security Requirement>> Minimize unauthorized lateral movement using network segmentation |
| |
|
Network Device and Infrastructure Protection |
<<Security Requirement>> Limit physical and logical access to authorized personnel |
| |
|
Network Device and Infrastructure Protection |
<<Security Requirement>> Identify and catalogue all network devices/components |
| |
|
User Devices |
Managed Devices |
| |
|
User Devices |
Unmanaged Devices |
| |
|
Managed Devices |
<<Security Requirement>> Maintain an update inventory of all user devices |
| |
|
Managed Devices |
<<Security Requirement>> Secure boot considerations |
| |
|
Managed Devices |
<<Security Requirement>> Assign each device with a verifiable unique identifier |
| |
|
Managed Devices |
<<Security Requirement>> Keep the configuration/health of all managed user devices up to date |
| |
|
Unmanaged Devices |
<<Security Requirement>> Limit access in accordance with policy |
| |
|
Unmanaged Devices |
<<Security Requirement>> Use of Mobile Threat Defense (MTD) tools/integration |