Zero Trust UC1 Authorized User Access ()
Zero Trust UC1 Authorized User Access
UC1 Authorized User Access- Implemented Control Measures
<<Implemented Control Measure>> Endpoint protection
<<Implemented Control Measure>> Automated remediation
<<Implemented Control Measure>> Device directory
<<Implemented Control Measure>> Single Sign-On (SSO)
<<Implemented Control Measure>> Multi-factor authentication (MFA)
<<Implemented Control Measure>> Conditional access policies
<<Implemented Control Measure>> In-app and session monitoring
<<Implemented Control Measure>> User Entity Behavior Analytics (UEBA)
<<Implemented Control Measure>> End-to-end encryption
<<Implemented Control Measure>> Data Loss Prevention (DLP)
Zero Trust Assets
<<Asset at Risk>> Data
<<Asset at Risk>> Application
<<Asset at Risk>> Reputation
Zero Trust Control Objectives
<<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely
<<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data
<<Threat Agent>> Attacker
Threat Event
Loss Event
Vunerability
Risk
<<Security Principle>> Zero Trust Principles
<<Security Requirement>> Zero Trust Requirements
UC1 Authorized User Access
<<Control Measure>> Reliable authentication of users and devices prior to granting access to the specific enterprise application
<<Control Measure>> Users should not access an application until sufficient level of trust is established
<<Control Measure>> Users authentication should be enhanced with the use of MFA
<<Control Measure>> Least privilege authorization in place for in app permissions
<<Control Measure>> Continuous monitoring of user actions for abnormal behavior
<<Control Measure>> Encrypted traffic between authorized user and enterprise resource
<<Control Measure>> Ensure real time assessment of device security prior to granting access to enterpriseresources
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> Endpoint protection
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> Automated remediation
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> Device directory
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> Single Sign-On (SSO)
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> Multi-factor authentication (MFA)
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> Conditional access policies
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> In-app and session monitoring
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> User Entity Behavior Analytics (UEBA)
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> End-to-end encryption
UC1 Authorized User Access- Implemented Control Measures <<Implemented Control Measure>> Data Loss Prevention (DLP)
UC1 Authorized User Access- Implemented Control Measures UC1 Authorized User Access
UC1 Authorized User Access- Implemented Control Measures Zero Trust Assets
UC1 Authorized User Access- Implemented Control Measures Vunerability
Zero Trust Assets <<Asset at Risk>> Reputation
Zero Trust Assets <<Asset at Risk>> Application
Zero Trust Assets <<Asset at Risk>> Data
Zero Trust Control Objectives <<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data
Zero Trust Control Objectives Risk
Zero Trust Control Objectives <<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely
<<Threat Agent>> Attacker Threat Event
Threat Event Loss Event
Threat Event Vunerability
Loss Event Vunerability
Loss Event Risk
Vunerability Zero Trust Assets
<<Security Principle>> Zero Trust Principles Zero Trust Control Objectives
<<Security Requirement>> Zero Trust Requirements Zero Trust Control Objectives
UC1 Authorized User Access <<Control Measure>> Encrypted traffic between authorized user and enterprise resource
UC1 Authorized User Access <<Control Measure>> Users authentication should be enhanced with the use of MFA
UC1 Authorized User Access <<Control Measure>> Users should not access an application until sufficient level of trust is established
UC1 Authorized User Access <<Control Measure>> Least privilege authorization in place for in app permissions
UC1 Authorized User Access <<Control Measure>> Ensure real time assessment of device security prior to granting access to enterpriseresources
UC1 Authorized User Access <<Control Measure>> Continuous monitoring of user actions for abnormal behavior
UC1 Authorized User Access <<Control Measure>> Reliable authentication of users and devices prior to granting access to the specific enterprise application
UC1 Authorized User Access <<Security Requirement>> Zero Trust Requirements
UC1 Authorized User Access <<Security Principle>> Zero Trust Principles