ZT Planning Flashcards

(63 cards)

1
Q

What are the core ZT principles for Zero-Trust Planning

A
  1. Never trust, always verify
  2. Inside-out security
  3. Risk-based security approach (assuming budget scarcity use risk to allocate budget)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What differences do you see in ZT planning and implementation between large and small companies?

A

Large organizations may pursue a portfolio of ZT initiatives with different motivations/success criteria
Small organizations may only have a single ZT effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which five steps should be considered initially when planning ZT

A
  1. Define the protect surface
  2. Map the transaction flows
  3. Build a ZTA
  4. Create a ZT policy
  5. Monitor and maintain the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the CISA high-level ZT Maturity Model consist of?

A

The CISA High-Level ZT Maturity model consists of:
1. Five pillars
2. Three cross-cutting concerns
3. Four maturity levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three cross-cutting concerns in the CISA ZT Maturity Model

A
  1. Visibility and Analytics
  2. Automation and Orchestration
  3. Governance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which stage is the starting point for a ZT transformation?

A

The ‘traditional’ model is the starting point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four stages in the CISA ZT MM?

A
  1. Traditional - no implementation of ZT
  2. Initial - starting to move to ZTA but still lacks essential features
  3. Advanced - Essential capabilities in place
  4. Optimal - continuous monitoring and optimization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five pillars of the CISA ZT MM

A
  1. Identity
  2. Devices
  3. Network
  4. Applications and workloads
  5. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should the primary focus during ZT planning be?

A

Aligning activities and resources to achieve business outcomse with acceptable risk levels defined by the board of directors and senior leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which are initial considerations for planning the implementation of ZT philosophy, approach, and design principles?

A
  1. The maturity level of the organization’s security approach
  2. The complexity of service architecture and data flows
  3. The risk appetite and regulatory environment of the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which assets may ZT migration tactics and design principle applied to based on the organization’s risk profile and risk appetite?

A

All assets in the organization
A limited set of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples key factors to be considered during ZT planning?

A

Stakeholders to engage
Technology strategy
BIA results
Risk Register
Supply chain risk management
Organizational security policies
Architecture options
Compliance requirements
Workforce training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is stakeholder identification critical?

A

It requires significant, concerted time/energy investment
It can make or break an organization’s ZT effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of stakeholders to be considered?

A

Business/service owners
Application/data owners
Infrastructure/asset owners
Service architecture owners
CISO/security teams
Legal officers
Compliance officers
Procurement officers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What must be done once stakeholders are identified?

A

Planning efforts should map out respective responsibilities (RACI chart)
Communications plan development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most critical ZT-specific role?

A

The asset owner:
- Determines valide users/roles/privileges/data usage
Typically exist in the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are best practices for stakeholder invovlement?

A

Should not lose focus on other internal users/groups
Must consist of stakeholders across organization and levels, including functional areas
Bring stakeholders in early, keep them engaged
Should be well-informed of organization’s collective mission/ongoing priorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the role of an asset custodian?

A

Asset custodians implement directives set by asset owners
Asset custodians are usually in IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What should communications plan in ZT contain at a minimum?

A

Define a communication strategy, establish cadence
Incorporate mechanisms for setting proper expectations
Means to communicate/document key decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a technology strategy?

A

A technology strategy describes how technology is being used to achieve business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Questions to ask about ZT and technology strategy?

A
  1. How does the ZT strategy fit into the organization’s technology strategy?
  2. How does the ZT strategy need to be updated to incorporate the technology strategy?
  3. How does the ZT strategy impact existing plans/processes/procedures?
  4. How does ZT strategy affect existing budgets/investments?
  5. How does ZT strategy affect existing internal standards/best practices?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does a BIA typically provide?

A

Asset list with
- relative values/owners
- RPO/RTO
- Interdepencies/prorities
Assessment of resources required to restore/maintain each asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does the risk register help ZT planning?

A

It provides:
- Inventory of potential risk events, recorded/tracked by likelihood/impact/description
- Controls for reducing risk within risk appetite thresholds
- The risk owner and the control owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which organizational policies will typically require an update when ZT is introduced?

A

Organizational policies affecting identity, devices, networks, applications and workloads, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the three categories of policies to consider when planning ZT?
Policies that dictate or constrain the ZT initiative Policies that require updating due to ZT Policies that need to be created to support ZT
26
Which policy types are generally. needed for ZT?
General and IT security ZT Data governance Cloud Key management policy Incident response IAM Monitoring DR/BC
27
In which ways is a ZT approach helpful for compliance?
Increased control over regulated data Better overall cybersecurity
28
How should training deal with ZT?
Training is foundational to ZT initiatives ZT should be part of the awareness progams
29
Who will need specific training on ZT?
Staff who determines access controls Staff who configures access controls Support team Auditing staff Upper management, board and CEO to ensure necessary awareness levels
30
Stakeholder identification effors should result in a responsibility matrix known as a
RACI chart
31
RACI stands for
Responsible, Accountable, Consulted, and Informed
32
What should governing documents approved by senior management and the board of directors contain as a starting point for identifying stakeholder responsibilities?
Designate the executive sponsor and provide insights into reporting expectations
33
What do RPO and RTO stand for?
RPO: Recovery Point Objectives RTO: Recovery Time Objectives
34
What should organizations starting with ZT planning start with?
1. Prerequisite for understanding the protect surface 2. Definition of the ZT project's scope/priorities 3. Business case development
35
What is prerequisite to understanding the protect surface?
Undersatnding what the organization wants to protect with ZT: Data/assets, data location, asset where data is hosted, services/processes/classifications. This requires: Data & asset discovery and inventory Data & asset classification Entities/user discovery and inventory
36
What are data and assets classified on?
Data sensitivity
37
What are meant with entities?
Person and non-person users (machines, APIs, service accounts)
38
What is done with the discovered entities?
Discovered entities are mapped to all relevant protect surfaces. Identities are used to define the ZT policies.
39
What will scope typically include?
Success criteria identified for the ZT projects Business units identified for the ZT journey The business units' protect surfaces The protect surface's data and assets Identities accessing the protect surface Entities mapped to the identities/personas
40
Approaches to prioritization:
Based on complexity: start simple, move to more complex Based on risk: select protect surface high on the risk register Based on use case: when a definite use case is identified
41
What are factors to consider in the business case?
BIA Risks that ZT program is designed to address Cost of the project Cost of not doing the project What the organization stands to gain through ZT Additional benefits from improving security culture
42
Use case examples for ZT
Role based access control for internal staff Remote Access Services Accessed using Mobile Devices Third-Party Service Providers Staff Access to Assets in hybrid environments SaaS & PaaS Application release & DevOps ICS, OT, & IoT
43
What is a gap analysis?
A gap-analysis is an industry-accepted tool for helping organizations realize their objectives. It consists generally of four steps: - Determine current state - Determine target state - Create a roadmap to close the gap - Requirements
44
What are crucial steps for determining the ZT current state?
1. Define current protect surfaces and implications for each ZT pillar 2. List current controls for each pillar 3. Determine/declare the current CISA maturity stage for each pillar 4. Risk appetite determination feeds into scoping activities/decisions
45
What is the goal of determining the ZT target state?
1. Define the protect surface and the impact for each in-scope pillar across the organization 2. Determine/declare the desired target CISA maturity stage per pillar
46
What does the roadmap for moving from ZT current state to ZT target state contain?
The roadmap contains the future controls required to raise the current maturity stage to the future desired state
47
What is the role of requirements in ZT planning?
ZTA implementation are a key output of the gap analysis
48
Which requirements areas should typically be defined for ZTA?
1. Source of truth for unique identities 2. Full life cycle identity management for employees, contractors and vendors 3. Definition, provisioning and management of entitlements 4. Definition, provisioning and management of access controls 5. Segmentation/micro-segmentation 6. Incident detection and response 7. Reporting and analytics 8. Special considerations 9. Concept of least privilege 10. Segregation of duties
49
Which considerations are relevant for the identity pillar of the target architecture?
Proper identity validation of the entity requesting access to a resource Frequency/technology determined by sensitivity of information being accessed MFA for validating identity of the entity Real-time machine learning to highlight unusual user/device behavior Identity stores with entities and associated information, queried during authentication process Process for ensuring user identities are mapped to real users Accuracy of claims controlled during the user lifecycle Integration of PKI with the identity system
50
Which considerations are relevant for the devices and endpoints pillar?
Devices/endpoints require authentication validation before accessing ZTA-protected resources Security posture validated against security policies before being allowed access Validation steps performed continuously Device behavior analyzed for any unusual activity Complete and accurate inventory of all devices/endpoints is highly sought-after goal Failures primarily due to vast number/relatively short life cycle of deployed devices\Helps achieve device and endpoint data quality goals Gateway/VDI solutions should be explored (for unmanaged devices and contractors)
51
Which considerations are relevant for the network & environment pillar?
Micro-segmentation coupled with encryption to improve network security posture Data plane used for application/service communication Control plane used for network communication control Decision to allow application access made over the control plane Application interaction/data exchange with requesting device occurs via data plane Micro-segmentation technologies and traffic segmentation based on data flow
52
Which considerations are relevant for the workload & application pillar?
Access authorization continuously evaluated with real-time risk analysis Security testing implemented in all stages of CI/CD Integration into monitoring system for sending internal insights
53
Which considerations are relevant for the data pillar?
Data classification policy should codify required data security controls/processes per defined data class Can include secure encryption and network segmentation for highly sensitive data Should include how entities gain access to data and required steps for end-of-life data disposal
54
Which considerations are relevant for the visibility & analytics capability?
UEBA for continually evaluating user behavior against a baseline of previous activity Running regular device posture assessments to ensure accessing devices are properly configured/secured Monitoring application health/security by leveraging systems/sensors external to the application
55
Which considerations are relevant for the automation & orchestration capability?
Takes advantage of automation by using infrastructure-as-code and CI/CD Orchestrating/automating the identity lifecycle Dynamic user identity and group membership/JIT application access
56
Which considerations are relevant for the governance capability?
Helps define ZTA policies Manages/reduces complexity with focus on protect surfaces Governance policies should be enforced by the PEP
57
Which categories do ZTA generally fall into?
1. ZTA using enhanced identity governance 2. ZTA using micro-segmentation 3. ZTA using network infrastructure and SDP
58
Which architecture variations are listed by NIST SP 800-207?
Device agent/gateway-based deployment Enclave-based deployment Resource portal-based deployment Device application sandboxing
59
How is a transaction defined in the context of ZT?
Any action within a system that needs verification
60
Which questions are relevant for each step in the transaction?
Who, what, where, when, how, and why
61
What needs to be considered when collecting data?
Begin with an initial understanding of the data What it is, where it is, and where it goes Start with existing knowledge about the organizations business process and underlying architecture Leverage numerous sources (packet captures, logs, traffic analysis)
62
When should a transaction inventory be created?
New deployments - transaction inventories defined/developed during architecture/design phase - Organizations should create inventory as part of planning exercises Existing deployments - collect/inventory known transactions to maintain - Highlight transactions that will change or become deprecated - Create entries for new transactions expected to be part of the solution
63