Zero trust is such a popular term in the security space today. Everyone is talking zero trust, Cisco included. The interesting point is it’s not new – the original architecture model was released in 2010, and the important guidelines have been part of good security practices for years; think about your important assets and develop secure perimeters around them. What has changed today is the design of security controls as it relates to secure perimeters. A secure perimeter with robust security controls can no longer exist at the network edge in today’s complex, cloud-based, heterogeneous environments. Disparate technologies, lack of integration, rapidly expanding threat surfaces and changing threat landscapes make the job of security difficult. That’s why zero trust is a process that begins first at the point of understanding your environment.
In today’s world, assets must be untrusted until network traffic and application behavior can be validated. Security controls must be driven down to the application workload level to be effective since applications are so critical to business today. This means extending your traditional security infrastructure with new technologies; network access needs to focus on the workload.
Protection starts with security closer to your applications using a new firewall type of enforcement that surrounds each workload. Enhance this with real-time visibility to map workload communications and application behaviors, and environmental context to determine whether they should be trusted. Then effective policy controls can be put in place to establish secure perimeters – micro-segmentation – at the workload level for stateful and consistent micro-segmentation across multi-cloud data centers at scale. This also allows you to minimize lateral movement in case of security incidents. Continual validation of trust is important to automatically update those policies based on changes to application dependencies and communication patterns. But the first step for a zero trust model for your application workloads is understanding your environment.
The Cisco answer to solve this problem is Cisco Secure Workload (formerly Tetration). Cisco Secure Workload provides east-west traffic firewalling, along with policy discovery and management; independent of where your workloads are located, on-premise, hybrid, or multi cloud or workload type, virtual machine, bare metal, microservices, container-based, etc. Through a single pane of glass, a context-based workload inventory is created n an automated way, through the auto-discovery and collection of application context and rich workload telemetry, Using this context and telemetry, Cisco Secure Workload then makes policy recommendations to help you understand what your workload policy should be. Without that level of understanding, you will struggle to effectively deploy zero trust (micro-segmentation) policy enforcement at the workload level. Enforcement without this level of understanding limits your zero trust policy effectiveness and increases the number of IT man hours and frustration.
For more information on a comprehensive zero trust strategy, here are couple of valuable resources
- Read this whitepaper
- Listen to this webinar recording
- Visit the Cisco Secure Workload page on Cisco.com
CONNECT WITH CISCO