Zero Trust Requirements ()
Zero Trust Requirements
<<Security Requirement>> Zero Trust Requirements
Resource Protection
<<Asset at Risk>> Data
<<Security Requirement>> Identify and catalogue all data resources
<<Security Requirement>> Label data to distinguish sensitive from non-sensitive data
<<Security Requirement>> Encrypt sensitive data at rest
<<Security Requirement>> Encrypt all end-to-end communication
<<Asset at Risk>> Application
<<Security Requirement>> Identify and catalogue all Applications and Services
<<Security Requirement>> Implement resource obfuscation
<<Security Requirement>> Automation and orchestration
<<Security Requirement>> Implement micro-segmentation to isolate applications and workflows
<<Security Requirement>> Secure application development
<<Security Requirement>> Software assurance and supply chain risk management
<<Asset at Risk>> Reputation
Continuous Monitoring
Security Visibility and Real-time Threat Protection
<<Security Requirement>> Traffic flow inspection and analysis
<<Security Requirement>> Security Information and Event Management (SIEM)
<<Security Requirement>> Traffic flow inspection and analysis
<<Security Requirement>> Real-time correlation, assessment and response based on inputs from multiple sources (including data from automated monitoring tools)
Users
Identification and Authentication
<<Security Requirement>> Comprehensive Identity, Credential and Access Management (ICAM)
<<Security Requirement>> Centralized authentication
<<Security Requirement>> Strong two-factor authentication (2FA) for all users, regardless of location
Privilege Management
<<Security Requirement>> Establish roles/group memberships
<<Security Requirement>> Associate roles/group memberships with each user
<<Security Requirement>> Add/remove memberships as required
Access Control
<<Security Requirement>> Risk Adaptive Access Control
<<Security Requirement>> Implement fine-grained, least privilege access control
<<Security Requirement>> Implement effective user account management procedures
Consent Management
Network
Network Device and Infrastructure Protection
<<Security Requirement>> Limit physical and logical access to authorized personnel
<<Security Requirement>> Minimize unauthorized lateral movement using network segmentation
<<Security Requirement>> Identify and catalogue all network devices/components
User Devices
Managed Devices
<<Security Requirement>> Maintain an update inventory of all user devices
<<Security Requirement>> Assign each device with a verifiable unique identifier
<<Security Requirement>> Keep the configuration/health of all managed user devices up to date
<<Security Requirement>> Secure boot considerations
Unmanaged Devices
<<Security Requirement>> Limit access in accordance with policy
<<Security Requirement>> Use of Mobile Threat Defense (MTD) tools/integration
<<Security Requirement>> Zero Trust Requirements Resource Protection
<<Security Requirement>> Zero Trust Requirements Continuous Monitoring
<<Security Requirement>> Zero Trust Requirements Users
<<Security Requirement>> Zero Trust Requirements Network
<<Security Requirement>> Zero Trust Requirements User Devices
Resource Protection <<Asset at Risk>> Application
Resource Protection <<Asset at Risk>> Reputation
Resource Protection <<Asset at Risk>> Data
<<Asset at Risk>> Data <<Security Requirement>> Encrypt all end-to-end communication
<<Asset at Risk>> Data <<Security Requirement>> Label data to distinguish sensitive from non-sensitive data
<<Asset at Risk>> Data <<Security Requirement>> Encrypt sensitive data at rest
<<Asset at Risk>> Data <<Security Requirement>> Identify and catalogue all data resources
<<Asset at Risk>> Application <<Security Requirement>> Implement micro-segmentation to isolate applications and workflows
<<Asset at Risk>> Application <<Security Requirement>> Implement resource obfuscation
<<Asset at Risk>> Application <<Security Requirement>> Secure application development
<<Asset at Risk>> Application <<Security Requirement>> Identify and catalogue all Applications and Services
<<Asset at Risk>> Application <<Security Requirement>> Software assurance and supply chain risk management
<<Asset at Risk>> Application <<Security Requirement>> Automation and orchestration
Continuous Monitoring Security Visibility and Real-time Threat Protection
Security Visibility and Real-time Threat Protection <<Security Requirement>> Traffic flow inspection and analysis
Security Visibility and Real-time Threat Protection <<Security Requirement>> Security Information and Event Management (SIEM)
Security Visibility and Real-time Threat Protection <<Security Requirement>> Traffic flow inspection and analysis
Security Visibility and Real-time Threat Protection <<Security Requirement>> Real-time correlation, assessment and response based on inputs from multiple sources (including data from automated monitoring tools)
Users Identification and Authentication
Users Privilege Management
Users Access Control
Users Consent Management
Identification and Authentication <<Security Requirement>> Centralized authentication
Identification and Authentication <<Security Requirement>> Comprehensive Identity, Credential and Access Management (ICAM)
Identification and Authentication <<Security Requirement>> Strong two-factor authentication (2FA) for all users, regardless of location
Privilege Management <<Security Requirement>> Associate roles/group memberships with each user
Privilege Management <<Security Requirement>> Establish roles/group memberships
Privilege Management <<Security Requirement>> Add/remove memberships as required
Access Control <<Security Requirement>> Implement fine-grained, least privilege access control
Access Control <<Security Requirement>> Implement effective user account management procedures
Access Control <<Security Requirement>> Risk Adaptive Access Control
Network Network Device and Infrastructure Protection
Network Device and Infrastructure Protection <<Security Requirement>> Minimize unauthorized lateral movement using network segmentation
Network Device and Infrastructure Protection <<Security Requirement>> Limit physical and logical access to authorized personnel
Network Device and Infrastructure Protection <<Security Requirement>> Identify and catalogue all network devices/components
User Devices Managed Devices
User Devices Unmanaged Devices
Managed Devices <<Security Requirement>> Maintain an update inventory of all user devices
Managed Devices <<Security Requirement>> Secure boot considerations
Managed Devices <<Security Requirement>> Assign each device with a verifiable unique identifier
Managed Devices <<Security Requirement>> Keep the configuration/health of all managed user devices up to date
Unmanaged Devices <<Security Requirement>> Limit access in accordance with policy
Unmanaged Devices <<Security Requirement>> Use of Mobile Threat Defense (MTD) tools/integration