ZT Planning Flashcards
(63 cards)
What are the core ZT principles for Zero-Trust Planning
- Never trust, always verify
- Inside-out security
- Risk-based security approach (assuming budget scarcity use risk to allocate budget)
What differences do you see in ZT planning and implementation between large and small companies?
Large organizations may pursue a portfolio of ZT initiatives with different motivations/success criteria
Small organizations may only have a single ZT effort
Which five steps should be considered initially when planning ZT
- Define the protect surface
- Map the transaction flows
- Build a ZTA
- Create a ZT policy
- Monitor and maintain the network
What does the CISA high-level ZT Maturity Model consist of?
The CISA High-Level ZT Maturity model consists of:
1. Five pillars
2. Three cross-cutting concerns
3. Four maturity levels
What are the three cross-cutting concerns in the CISA ZT Maturity Model
- Visibility and Analytics
- Automation and Orchestration
- Governance
Which stage is the starting point for a ZT transformation?
The ‘traditional’ model is the starting point.
What are the four stages in the CISA ZT MM?
- Traditional - no implementation of ZT
- Initial - starting to move to ZTA but still lacks essential features
- Advanced - Essential capabilities in place
- Optimal - continuous monitoring and optimization
What are the five pillars of the CISA ZT MM
- Identity
- Devices
- Network
- Applications and workloads
- Data
What should the primary focus during ZT planning be?
Aligning activities and resources to achieve business outcomse with acceptable risk levels defined by the board of directors and senior leadership
Which are initial considerations for planning the implementation of ZT philosophy, approach, and design principles?
- The maturity level of the organization’s security approach
- The complexity of service architecture and data flows
- The risk appetite and regulatory environment of the organization
Which assets may ZT migration tactics and design principle applied to based on the organization’s risk profile and risk appetite?
All assets in the organization
A limited set of assets
What are examples key factors to be considered during ZT planning?
Stakeholders to engage
Technology strategy
BIA results
Risk Register
Supply chain risk management
Organizational security policies
Architecture options
Compliance requirements
Workforce training
Why is stakeholder identification critical?
It requires significant, concerted time/energy investment
It can make or break an organization’s ZT effort
What are examples of stakeholders to be considered?
Business/service owners
Application/data owners
Infrastructure/asset owners
Service architecture owners
CISO/security teams
Legal officers
Compliance officers
Procurement officers
What must be done once stakeholders are identified?
Planning efforts should map out respective responsibilities (RACI chart)
Communications plan development
What is the most critical ZT-specific role?
The asset owner:
- Determines valide users/roles/privileges/data usage
Typically exist in the business
What are best practices for stakeholder invovlement?
Should not lose focus on other internal users/groups
Must consist of stakeholders across organization and levels, including functional areas
Bring stakeholders in early, keep them engaged
Should be well-informed of organization’s collective mission/ongoing priorities
What is the role of an asset custodian?
Asset custodians implement directives set by asset owners
Asset custodians are usually in IT
What should communications plan in ZT contain at a minimum?
Define a communication strategy, establish cadence
Incorporate mechanisms for setting proper expectations
Means to communicate/document key decisions
What is a technology strategy?
A technology strategy describes how technology is being used to achieve business objectives
Questions to ask about ZT and technology strategy?
- How does the ZT strategy fit into the organization’s technology strategy?
- How does the ZT strategy need to be updated to incorporate the technology strategy?
- How does the ZT strategy impact existing plans/processes/procedures?
- How does ZT strategy affect existing budgets/investments?
- How does ZT strategy affect existing internal standards/best practices?
What does a BIA typically provide?
Asset list with
- relative values/owners
- RPO/RTO
- Interdepencies/prorities
Assessment of resources required to restore/maintain each asset
How does the risk register help ZT planning?
It provides:
- Inventory of potential risk events, recorded/tracked by likelihood/impact/description
- Controls for reducing risk within risk appetite thresholds
- The risk owner and the control owner
Which organizational policies will typically require an update when ZT is introduced?
Organizational policies affecting identity, devices, networks, applications and workloads, and data