Identify your data
Knowing where and what your sensitive data is—that's the key to protecting your environment and establishing a Zero Trust architecture strategy.
Identifying traffic flows between applications, spotting the attack surface is one of the most important, but also most daunting tasks in creating your Zero Trust architecture. Not only is it hard to get the traffic, but also your network changes and those changes need to be reflected in the model in real time. Identifying applications and application dependencies is key before moving to the next stage.
Once you see traffic, it will become easier to create a Zero Trust architecture policy with a default deny standard rule. It gets much easier to define and spot micro-perimeters e.g. for specific applications, but also to see traffic for privileged access at the application boundaries.
Illumio will help you automatically generate the optimal policy for the application and help you to identify flows that are not compliant.
Testing the policy is part of the workflow and gives you a way to test without actually going into full enforcement of the policy. Resulting in less risk and decreasing the failure rate to a minimum.
Enforcing a policy is something that used to be very risky, every policy change could result in network outages and availability problems for applications. With a test mode this threat will go away and get you to enforcement faster and without the risk of breaking applications.
Track alerts for policy violations in real-time and enhance your alerting with meaningful, contextual data, encrypt east-west traffic transparently and have full visibility throughout the application lifecycle.
Monitor and maintain
Keeping and maintaining your enterprise security and your implementation requires constant work and effort. Remember that Zero Trust architecture is not a technology, but a framework and process. With what you learned you can implement Zero Trust architecture with each new application in your enterprise and find the optimal workflow over time while maintaining a never trust, always verify approach.
Embrace security automation and orchestration
Only through orchestration and automation will you be able to maintain a stable, predictable and reliable network security model.
The above workflow will greatly reduce complexity, decrease the risk associated with changes and get you to a Zero Trust architecture model much faster.