Since zero trust is not a concrete thing it’s a conceptual framework, what have you found useful for operationalizing the concept?
Agent
N/A
Platform
Using Lacework/Operationalizing
Cloud
N/A
Best answer by Ben Sherman
View originalSince zero trust is not a concrete thing it’s a conceptual framework, what have you found useful for operationalizing the concept?
Agent
N/A
Platform
Using Lacework/Operationalizing
Cloud
N/A
Best answer by Ben Sherman
View originalZeroTrust as a concept per NIST SP 800-207 publication lays out some hard to operationalize asks, so pile-on your opinions/approaches/frameworks here. From my understanding, ZT starts with assuming the network is hostile (think about Lacework Attack Paths to the Internet), that organizations need to catalog people and devices (think about Lacework’s resource view pages) and build solid application-level boundaries (Lacework IaC and application/behavioral polygraphs) by managing fine-grained access and entitlements that can withstand an audit (Lacework CIEM). Although you might encounter this post from 2022, in 2023 Lacework has since added CIEM and from my perspective Lacework now offers an even better tool that can be added to any ZT framework. Per the Identity Security Alliance , they talk about 9 specific best practices required of any ZT organization (below). This assumes that identity is the new security perimeter because micro-segmentation and, DMZs, VPNs in the public cloud have broken all rules-based approaches used with end-point and firewall controls due to the volume of exceptions and changes made daily. Also, rules only ZT approaches can’t possibly account for all the unauthorized/insecure lateral movement security teams see *(and describe in breaches) every day. Lacework opted for a hybrid rules optional approach. Supported are the “never trust always verify authentication approaches,” where security software vendors have to provide a continuum of risks to also accommodate “just enough” (least privilege), “just-in-time” (zero standing privileges) asks using a a variety of checks where cumulative risks are considered. The key is continuously monitoring and flagging anomalies as they emerge; a Lacework differentiator. If identity were the new ZT boundary to achieve, then Lacework exceeds these 9 best practices:
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.