Skip to main content

Cisco Zero Trust Architecture

 As a follow up to the previous post around Zero Trust Architecture, Cisco has been delivering zero trust architectures for customers for many years. With the platform approach provided by Cisco Zero Trust organizations gain better visibility across users, devices, containers, networks, and applications, verifying their security states with every access request.

Adopting this model provides a balance between security and usability. Security teams can make it harder for attackers to collect what they need (user credentials, network access, and the ability to move laterally), and users can get a consistent and more productive security experience, regardless of where they’re located, what endpoints they’re using, or whether their applications are on-premises or in the cloud.

Cisco Zero Trust provides a comprehensive approach to securing all access across applications and environment, from any user, device and location. It protects the workforce, workloads and workplace. 

The 3xWs, as I like to refer to them as define individual areas to focus on to accelerate an organizations journey and adoption of zero trust. At a high level:

  • Zero Trust for the Workforce: People, such as employees, contractors, partners and vendors accessing work applications, using their personal or corporate- managed devices. This pillar ensures only the right users and secure devices can access applications, regardless of location.  
  • Zero Trust for Workloads: Applications and their workloads running in the cloud, in on-premise data centers, and other virtualized environments that interact with one another. This pillar focuses on secure access when an API, a microservice or a container is accessing a database or other component within an application. 
  • Zero Trust for the Workplace: This pillar focuses on secure access for any and all devices (including IoT) that connect to enterprise networks. These include user endpoints, physical and virtual servers, printers, cameras, HVAC systems, kiosks, infusion pumps, industrial control systems, and more.  
And while many integrated solutions and technology enable this functionality, Cisco has focused on 3 primary tools to deliver a seamless end to end zero trust architecture with Duo, Software-Defined Access (SDA or SD-Access for short) and Tetration:


To enable an end to end architecture, a consistent methodology can be utilized for all Ws:

  • Establish Trust
    • User & device identity
    • Device posture & vulnerabilities
    • Any workloads
    • App/service trust
    • Any indicators of compromise
  • Enforce Trust-Based Access
    • Applications
    • Network resources
    • Workload communications
    • All workload users/admins
  • Continuously Verify Trust 
    • Original tenets used to establish trust are still true
    • Traffic is not threat traffic
    • Any risky, anomalous and malicious behavior
    • If compromised, then the trust level is changed

All in all Cisco Zero Trust delivers some important capabilities and outcomes:

  • Visibility across all environments - Get insight into all users and devices accessing your applications; all connections and applications across a multi-cloud environment; and all connections on your network, including Internet of Things (IoT) devices. Discover early and often what's added to your network, and who has added it as part of the Cisco Zero Trust solution.

  • Provide secure, contextual access - Whether for your users, their devices, applications or any type of connected device on or off your network, Cisco Zero Trust grants secure, policy-based access based on attributes and risk levels associated with the user, device, application and network

  • Contain breaches, at scale - Cisco Zero Trust provides application segmentation for on-premises and multi-cloud environments, which can help minimize lateral movement by an attacker that has already gained access to an organization’s application(s)

  • Broad security coverage - Implement a broad zero-trust security approach across your workforce (users and devices connecting to applications), workloads (all connections between your applications, across the multi-cloud) and workplace (all connections across your network, including IoT).

  • Detect vulnerabilities - Flag risky devices, identify software vulnerabilities and detect security incidents using behavioral analysis to reduce your attack surface. Tap into Cisco’s threat intel database paired with Cisco’s partner integration ecosystem for contextual data about connections to your network.

  • Enforce policies and controls - Enforce user, device or application-specific access policies to meet your organization's security requirements for access. Automate policy consistently across your multi-cloud environment for application segmentation. Distribute policy enforcement across your entire network from one centralized location.

  • Respond to threats quickly - Identify and contain threats related to software vulnerabilities or anomalous server behavior by blocking communication. Restrict access to your applications by users and their devices if they fail to meet minimum security requirements, or notify users to update their own devices. Revoke

Comments

  1. This article provided me with a wealth of information. The article is incredibly helpful and offers some of the most useful information Enterprise Wireless Solutions. Thank you for sharing it with us.

    ReplyDelete
  2. Thanks for sharing this article here about the IT Service. Your article is very informative and I will share it with my other friends as the information is really very useful. Keep sharing your excellent work.Back Office Support Services

    ReplyDelete
  3. A very delightful article that you have shared here. Your blog is a valuable and engaging article for us, and also I will share it with my companions who need this info, Australia Technology News Website Thankful to you for sharing an article like this.

    ReplyDelete
  4. "Thank you for sharing such valuable information about vermicompost . Your post has motivated me to start my own worm bin and reduce my waste while enriching my garden soil. Truly appreciate your expertise!"

    ReplyDelete
  5. Nice Post.
    Harvesting Vermicompost:

    Once the bedding is mostly converted into dark, crumbly vermicompost (after a few months), it's ready for use. Push the finishedvermicompost to one side of the bin, then add fresh bedding and food to the other side. Worms will migrate to the new bedding, allowing you to easily collect the vermicompost from the emptied side.

    ReplyDelete
  6. It's clear you've put a lot of effort into ensuring readers can take away valuable insights.
    Amazon Store in Dubai

    ReplyDelete

Post a Comment

Popular posts from this blog

Why are Virtual Private Networks and Software Defined Perimeters mutually exclusive?

Increased remote work, vulnerabilities popping up and the #killthevpn movement has the cyber security industry laser focused on the transition from VPN to SDP. Let’s start with an acceptable definition of SDP from Wikipedia: “Software-defined perimeter (SDP) framework was developed by the Cloud Security Alliance (CSA) to control access to resources based on identity. Connectivity in a Software Defined Perimeter is based on a need-to-know model, in which device posture and identity are verified before access to application infrastructure is granted.” I hope we all can agree that the “ground truth" of SDP is valid and any organizations will benefit by adopting SDP architecture and principals(including Zero Trust). How is a Remote Access VPN any different than the “Client-to-gateway” deployment model defined for SDP? “In the client-to-gateway implementation, one or more servers are protected behind an Accepting SDP Host such that the Accepting SDP Host acts as a gateway between ...

Cisco Releases Idenity Services Engine (AKA ISE)

Introduction After years of innovation around Network Access Control, Cisco has released its next generation NAC solution: Identity Services Engine. ISE is combines existing loosely coupled devices AAA, profiling, posture and guest management - in single, scalability appliance. As part of the Cisco TrustSec solution and Cisco’s SecureX architecture for Borderless Networks, the Cisco Identity Service Engine provides a centralized policy engine for business relevant policy definition and enforcement. This policy work horse enables centralized, coordinated policy creation and consistent policy enforcement across the entire corporate infrastructure, from head office to branch office. ISE Features & Benefits Visibility: Single Platform & Pane of Glass - Let IT see who and what is on the network for advanced discovery and troubleshooting Dynamically collects & consolidates endpoint information to make adaptive policy decisions based on ‘context’ Integrates functions previously d...