Zero Trust UC9 Layer 7 Attacks and Lateral Movement Protection ()
Zero Trust UC9 Layer 7 Attacks and Lateral Movement Protection
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures
<<Implemented Control Measure>> User Entity Behavior Analytics (UEBA)
<<Implemented Control Measure>> Threat Intelligence
<<Implemented Control Measure>> Data Loss Prevention (DLP)
<<Implemented Control Measure>> Microsegmentation
<<Implemented Control Measure>> Web application Firewall
<<Implemented Control Measure>> Security Information and Event Management (SIEM)
<<Implemented Control Measure>> Conditional access
<<Implemented Control Measure>> Network Monitoring
UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures
<<Control Measure>> Implement monitoring of user behavior and activities and detect anomalies
<<Control Measure>> Enable logging and alerting to monitor policy violation
<<Control Measure>> Isolate workloads through implementation of micro segmentation and granularperimeters policy enforcement
<<Control Measure>> Control access to content by allowing/blocking web requests through robust accesspolicies
<<Control Measure>> Intelligent network traffic monitoring, breach detection and proactive response
Zero Trust Assets
<<Asset at Risk>> Data
<<Asset at Risk>> Application
<<Asset at Risk>> Reputation
Zero Trust Control Objectives
<<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely
<<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data
<<Threat Agent>> Attacker
Threat Event
Loss Event
Vunerability
Risk
<<Security Principle>> Zero Trust Principles
<<Security Requirement>> Zero Trust Requirements
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures <<Implemented Control Measure>> User Entity Behavior Analytics (UEBA)
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures <<Implemented Control Measure>> Threat Intelligence
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures <<Implemented Control Measure>> Data Loss Prevention (DLP)
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures <<Implemented Control Measure>> Microsegmentation
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures <<Implemented Control Measure>> Web application Firewall
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures <<Implemented Control Measure>> Security Information and Event Management (SIEM)
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures <<Implemented Control Measure>> Conditional access
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures <<Implemented Control Measure>> Network Monitoring
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures
UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures Vunerability
UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures <<Control Measure>> Implement monitoring of user behavior and activities and detect anomalies
UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures <<Control Measure>> Enable logging and alerting to monitor policy violation
UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures <<Control Measure>> Isolate workloads through implementation of micro segmentation and granularperimeters policy enforcement
UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures <<Control Measure>> Control access to content by allowing/blocking web requests through robust accesspolicies
UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures <<Control Measure>> Intelligent network traffic monitoring, breach detection and proactive response
UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures <<Security Requirement>> Zero Trust Requirements
UC9 -Layer 7 Attacks and Lateral Movement Protection - Control Measures <<Security Principle>> Zero Trust Principles
Zero Trust Assets <<Asset at Risk>> Reputation
Zero Trust Assets <<Asset at Risk>> Data
Zero Trust Assets <<Asset at Risk>> Application
Zero Trust Assets UC9 -Layer 7 Attacks and Lateral Movement Protection - Implemented Contorl Measures
Zero Trust Control Objectives Risk
Zero Trust Control Objectives <<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data
Zero Trust Control Objectives <<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely
<<Threat Agent>> Attacker Threat Event
Threat Event Vunerability
Threat Event Loss Event
Loss Event Vunerability
Loss Event Risk
Vunerability Zero Trust Assets
<<Security Principle>> Zero Trust Principles Zero Trust Control Objectives
<<Security Requirement>> Zero Trust Requirements Zero Trust Control Objectives