Zero Trust UC8 On Premise Application to Cloud Application ()
Zero Trust UC8 On Premise Application to Cloud Application
UC8 On Premise Application to Cloud Application - Implemented Control Measures
<<Implemented Control Measure>> Microsegmentation
<<Implemented Control Measure>> API Security
<<Implemented Control Measure>> Single Sign-On (SSO)
<<Implemented Control Measure>> Application Whitelisting and Ring-fencing
<<Implemented Control Measure>> In-app and session monitoring
UC8 On Premise Application to Cloud Application - Control Measures
<<Control Measure>> Ensure data security through end to end encryption at the application level
<<Control Measure>> Continuously log and monitor all traffic between applications and enforce security policies on an ongoing basis
<<Control Measure>> Allow permissions only on a least privilege bases i.e. deny by default
<<Control Measure>> Ensure only known, allowed traffic or legitimate application communication is allowed by segmentation
<<Control Measure>> Applications are verified for proper authentication and authorization before eachsend/connect request
Zero Trust Assets
<<Asset at Risk>> Data
<<Asset at Risk>> Application
<<Asset at Risk>> Reputation
Zero Trust Control Objectives
<<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely
<<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data
<<Threat Agent>> Attacker
Threat Event
Loss Event
Vunerability
Risk
<<Security Principle>> Zero Trust Principles
<<Security Requirement>> Zero Trust Requirements
UC8 On Premise Application to Cloud Application - Implemented Control Measures <<Implemented Control Measure>> Microsegmentation
UC8 On Premise Application to Cloud Application - Implemented Control Measures <<Implemented Control Measure>> API Security
UC8 On Premise Application to Cloud Application - Implemented Control Measures <<Implemented Control Measure>> Single Sign-On (SSO)
UC8 On Premise Application to Cloud Application - Implemented Control Measures <<Implemented Control Measure>> Application Whitelisting and Ring-fencing
UC8 On Premise Application to Cloud Application - Implemented Control Measures <<Implemented Control Measure>> In-app and session monitoring
UC8 On Premise Application to Cloud Application - Implemented Control Measures Vunerability
UC8 On Premise Application to Cloud Application - Implemented Control Measures UC8 On Premise Application to Cloud Application - Control Measures
UC8 On Premise Application to Cloud Application - Control Measures <<Security Requirement>> Zero Trust Requirements
UC8 On Premise Application to Cloud Application - Control Measures <<Security Principle>> Zero Trust Principles
UC8 On Premise Application to Cloud Application - Control Measures <<Control Measure>> Ensure data security through end to end encryption at the application level
UC8 On Premise Application to Cloud Application - Control Measures <<Control Measure>> Continuously log and monitor all traffic between applications and enforce security policies on an ongoing basis
UC8 On Premise Application to Cloud Application - Control Measures <<Control Measure>> Allow permissions only on a least privilege bases i.e. deny by default
UC8 On Premise Application to Cloud Application - Control Measures <<Control Measure>> Ensure only known, allowed traffic or legitimate application communication is allowed by segmentation
UC8 On Premise Application to Cloud Application - Control Measures <<Control Measure>> Applications are verified for proper authentication and authorization before eachsend/connect request
Zero Trust Assets <<Asset at Risk>> Application
Zero Trust Assets <<Asset at Risk>> Reputation
Zero Trust Assets <<Asset at Risk>> Data
Zero Trust Assets UC8 On Premise Application to Cloud Application - Implemented Control Measures
Zero Trust Control Objectives <<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely
Zero Trust Control Objectives <<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data
Zero Trust Control Objectives Risk
<<Threat Agent>> Attacker Threat Event
Threat Event Vunerability
Threat Event Loss Event
Loss Event Risk
Loss Event Vunerability
Vunerability Zero Trust Assets
<<Security Principle>> Zero Trust Principles Zero Trust Control Objectives
<<Security Requirement>> Zero Trust Requirements Zero Trust Control Objectives