Transform your network and modernize your security

Learn which products will help you get started

Questions about Zero Trust?

[email protected]

Traditional network architecture was built with the concept of a perimeter network where once someone was on the network, there was an implicit level of trust. The shift toward cloud hosting, remote work and other modernization has created challenges with a traditional perimeter network architecture.

These challenges can be addressed by implementing a Zero Trust Architecture, which ensures that all traffic in and out of a business is verified and authorized. Implementing a Zero Trust Architecture can be done in steps without disrupting employee productivity and connectivity.

This roadmap was built by security experts to provide a vendor agnostic Zero Trust architecture and example implementation timeline. The timeline assumes that an organization is beginning their Zero Trust journey from scratch, but is meant to be useful for all organizations.

There are seven major components to organizational security that need to be considered when it comes to implementing a comprehensive Zero Trust Architecture. Your implementation order does not need to match how they are listed in the component and reference architecture sections below.

Components of a Zero Trust Architecture

Users

  1. Establish a corporate identity
  2. Enforce MFA for all applications

Endpoints and Devices

  1. Implement MDM/UEM to control corporate devices
  2. Implement endpoint protection
  3. Inventory all corporate devices, APIs and services

Internet Traffic

  1. Block DNS requests to known threats
  2. Block threats behind SSL/TLS

Networks

  1. Segment user network access
  2. Use Internet backbones for branch to branch connectivity
  3. Close all inbound ports open to the Internet for application delivery

Applications

  1. Monitor inbound emails and filter out phishing attempts
  2. Inventory all corporate applications
  3. Zero Trust policy enforcement for Applications
    1. Publicly addressable
    2. Privately addressable
    3. SaaS applications
    4. Non-browser apps (SSH, RDP, SMB, thick clients)
  4. Protect applications from Layer 7 attacks (DDoS, injection, bots, etc)
  5. Enforce HTTPS and DNSsec

Data Loss Prevention and Logging

  1. Establish a process to log and review traffic on sensitive applications
  2. Define what data is sensitive and where it exists
  3. Stop sensitive data from leaving your applications (e.g. PII, CCNs, SSNs, etc)
  4. Identify misconfigurations and publicly shared data in SaaS tools
  5. Establish a SOC for log review, policy updates and mitigation
  6. Stay up to date on known threat actors

Steady State

  1. Employ a DevOps approach to ensure policy enforcement for all new resources
  2. Implement auto-scaling for on-ramp resources

Reference Architecture

This is a reference guide that explains each function in a Zero Trust Architecture along with recommended vendors for each function.


Level of effort scale:

🔧 - Small effort; this can be done by an individual or small team

🔧🔧 - Medium effort; this will require a team and advanced preparation

🔧🔧🔧 - Large effort; this will require multiple teams and a project plan

Users

Users include employees, contractors and customers. To implement zero trust, an organization must first have an accurate picture of who should actually be trusted, and with what — otherwise known as Identity. Then it must establish a way to securely authenticate the identity of its users.

Establish a corporate identity

Enforce multi-factor authentication for all applications

Endpoints and Devices

Endpoints and Devices include any device, API or software service within an organization or that have access to organizational data. Organizations must first understand their full set of devices, APIs and services. Then Zero Trust policies can be implemented based on the context of the device, API and service.

Implement mobile device management

Implement endpoint protection

Inventory devices, APIs and services

Internet Traffic

Internet Traffic includes all user traffic destined for websites outside of an organization’s control. This can range from business related tasks to personal website usage. All outbound traffic is susceptible to malware and malicious sites. An organization must establish visibility and control over user traffic destined for the Internet.

Block DNS requests to known threats or risky destinations

Block or isolate threats behind SSL/TLS

Network

Networks include all public, private and virtual networks within an organization. Organizations must first understand their existing set of networks and segment them to prevent lateral movement. Then, Zero Trust policies can be created that granularly control which segments of a network that users, endpoint and devices can access.

Segment user network access

Use broadband Internet for branch to branch connectivity

Close all inbound ports open to the Internet for application delivery

Applications

Applications include any resource where organizational data exists or business processes are performed. Organizations must first understand the applications that exist and then establish Zero Trust policies for each application or, in some cases, block unapproved applications.

Monitor email applications and filter out phishing attempts

Inventory all corporate applications

Zero Trust policy enforcement for Applications

Protect applications from Layer 7 attacks (DDoS, injection, bots, etc)

Enforce HTTPS and DNSsec

Data Loss Prevention and Logging

Once you have established all the Zero Trust elements of your architecture to this point, your architecture will be generating large volumes of data on what’s happening inside your network. At this point, it’s time to implement Data Loss Prevention and Logging. These are a set of processes and tools that focus on keeping sensitive data inside of a business and flagging any potential opportunities for data leakage. Organizations must first understand where their sensitive data exists. Then they can establish Zero Trust controls to block sensitive data being accessed and exfiltrated.

Establish a process to log and review traffic on sensitive applications

Define what data is sensitive and where it exists

Prevent sensitive data from leaving your applications

Identify misconfigurations and publicly shared data in SaaS tools

Establish a Security Operations Center (SOC) for log review, policy updates and mitigation

Stay up to date on known threat actors

Steady State

Once you have built out your Zero Trust architecture for all the other elements of your organization, there are a set of actions you can take to move your organization to a Zero Trust steady state, ensuring consistency with the architecture moving forward.

Employ a DevOps approach to ensure consistent policy enforcement for all new resources

Example implementation timeline

Every Zero Trust Architecture deployment is unique but there are a common set of steps that most projects follow. This is a recommended timeline for a business getting started on a Zero Trust Architecture implementation.

Timeline Goal Relevant Products
Phase 1 ❑ Deploy global DNS filtering Cisco Umbrella DNS, Cloudflare Gateway, DNSFilter, Zscaler Shift
❑ Monitor inbound emails and filter out phishing attempts

Security Email Gateways: Cloudflare Area 1 Email Security, Mimecast, TitanHQ


Browser Isolation: Cloudflare Browser Isolation, Zscaler Cloud Browser Isolation

❑ Identify misconfigurations and publicly shared data in SaaS tools Cloudflare CASB, DoControl, Netskope CASB, Zscaler CSPM
Phase 2 ❑ Establish corporate identity Microsoft Azure AD, Okta, PingOne, Onelogin
❑ Enforce MFA for all application

Identity providers: Microsoft Azure AD, Okta, PingIdentity PingOne, Onelogin, Duo


Application Reverse Proxies: Azure AD App Proxy, Akamai EAA, Cloudflare Access, Netskope Private Access, Zscaler Private Access (ZPA)

❑ Enforce HTTPS and DNSsec Akamai, AWS, Azure, Cloudflare, GCP
❑ Block or isolate threats behind SSL

TLS Decryption: Cloudflare Gateway, Netskope Next Gen SWG, Zscaler Internet Access (ZIA)


Isolated Browsers: Cloudflare Browser Isolation, Zscaler Cloud Browser Isolation

❑ Zero Trust policy enforcement for publicly addressable applications Zero Trust Reverse Proxies: Azure App Proxy, Cloudflare Access, Netskope Private Access, Zscaler Private Access (ZPA)
❑ Protect applications from layer 7 attacks (DDoS, Injection, Bots, etc) Akamai, AWS, Azure, Cloudflare, GCP
❑ Close all inbound ports open to the Internet for application delivery Akamai EAA, Cloudflare Access, Netskope Private Access, Zscaler Private Access (ZPA)
Phase 3 ❑ Inventory all corporate applications Secure Web Gateway and CASB’s with Shadow IT discovery: Cloudflare Gateway, Microsoft Defender for Cloud Apps, Netskope Next Gen SWG, Zscaler Internet Access (ZIA)
❑ Zero Trust policy enforcement for SaaS applications

Zero Trust Network Access (ZTNA): Cloudflare Access, Netskope, Zscaler Private Access (ZPA)


CASB: Cloudflare CASB, Netskope CASB, Zscaler CASB

❑ Segment user network access Cloudflare Zero Trust (Access and Gateway), Netskope Private Access, Zscaler Private Access (ZPA)
❑ Zero Trust Network Access for privately addressable applications Cloudflare Access, Netskope Private Access, Zscaler Internet Access (ZIA)
❑ Implement MDM/UEM to control corporate devices

Mac: Jamf, Kandji

Windows: Microsoft Intune

❑ Define what data is sensitive and where it exists DataDog, Splunk, SolarWinds
❑ Send out hardware based authentication tokens Hard Keys: Yubico
❑ Stay up to date on known threat actors Cloudflare Radar, CISA, OWASP
Phase 4 ❑ Enforce hardware token based MFA Hard Keys: Yubico
❑ Establish a SOC for log review, policy updates and mitigation N/A
❑ Implement endpoint protection VMWare Carbon Black, Crowdstrike, SentinelOne, Microsoft Windows Defender
❑ Inventory all corporate devices, APIs and services

Device Inventory: VMWare Carbon Black, Crowdstrike, Oomnitza, SentinelOne

API/Service inventory: Cloudflare Application Connector, Zscaler Private Access (ZPA)

❑ Use broadband Internet for branch to branch connectivity Cloudflare Magic WAN, Cato Networks, Aryaka FlexCore
❑ Establish a process to log and review employee activity on sensitive applications

Secure Web Gateway (SWG): Cisco Umbrella, Cloudflare Gateway, Netskope, Zscaler Internet Access (ZIA)


Security Incident and Event Monitoring (SIEM): DataDog, Splunk, SolarWinds

❑ Stop sensitive data from leaving your applications (e.g. PII, credit cards, SSNs, etc) Cisco Umbrella, Cloudflare Gateway, Netskope Next Gen SWG, Zscaler Internet Access (ZIA)
❑ Employ a DevOps approach to ensure policy enforcement for all new resources Ansible, Puppet, Terraform
❑ Implement auto-scaling for on-ramp resources

Load balancers: Akamai, Cloudflare


Infrastructure automation: Ansible, Puppet, Terraform