|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
<<Implemented Control Measure>> Multi-factor authentication (MFA) |
|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
<<Implemented Control Measure>> In-app and session monitoring |
|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
<<Implemented Control Measure>> Data Loss Prevention (DLP) |
|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
<<Implemented Control Measure>> End-to-end encryption |
|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
<<Implemented Control Measure>> User Entity Behavior Analytics (UEBA) |
|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
<<Implemented Control Measure>> Device Management |
|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
Zero Trust Assets |
|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
UC3 Authorized user access through unmanaged devices - Control Measures |
|
|
UC3 Authorized user access through unmanaged devices - Implemented Control Measures |
Vunerability |
|
|
UC3 Authorized user access through unmanaged devices - Control Measures |
<<Control Measure>> End to end encryption of traffic |
|
|
UC3 Authorized user access through unmanaged devices - Control Measures |
<<Control Measure>> Leverage multi factor authentication (MFA) as part of the authentication process for the user |
|
|
UC3 Authorized user access through unmanaged devices - Control Measures |
<<Control Measure>> Limited access to the organization’s resources from unmanaged devices throughconditional access controls |
|
|
UC3 Authorized user access through unmanaged devices - Control Measures |
<<Control Measure>> Continuous visibility and control |
|
|
UC3 Authorized user access through unmanaged devices - Control Measures |
<<Control Measure>> Enforced device authentication prior to access corporate resources |
|
|
UC3 Authorized user access through unmanaged devices - Control Measures |
<<Control Measure>> Device security assessment to ensure required security posture is in place prior togranting access |
|
|
UC3 Authorized user access through unmanaged devices - Control Measures |
<<Security Requirement>> Zero Trust Requirements |
|
|
UC3 Authorized user access through unmanaged devices - Control Measures |
<<Security Principle>> Zero Trust Principles |
|
|
Zero Trust Assets |
<<Asset at Risk>> Reputation |
|
|
Zero Trust Assets |
<<Asset at Risk>> Data |
|
|
Zero Trust Assets |
<<Asset at Risk>> Application |
|
|
Zero Trust Control Objectives |
Risk |
|
|
Zero Trust Control Objectives |
<<Control Objective>> Providing a secure platform that ensures safety and protection of systems and data |
|
|
Zero Trust Control Objectives |
<<Control Objective>> Enabling the establishment of a secure and resilient enterprise digital security ecosystem in which government services are delivered safely and securely |
|
|
<<Threat Agent>> Attacker |
Threat Event |
|
|
Threat Event |
Vunerability |
|
|
Threat Event |
Loss Event |
|
|
Loss Event |
Vunerability |
|
|
Loss Event |
Risk |
|
|
Vunerability |
Zero Trust Assets |
|
|
<<Security Principle>> Zero Trust Principles |
Zero Trust Control Objectives |
|
|
<<Security Requirement>> Zero Trust Requirements |
Zero Trust Control Objectives |