How Do I Start My Zero Trust Implementation?
Table of Contents
Expand all | Collapse all
How Do I Start My Zero Trust Implementation?
This topic answers the fundamental question for any deployment
activity: “Where do I start?”
Education and collaboration begin the
journey to a Zero Trust enterprise. Stakeholders who identify what’s
valuable to your business and who architect how to protect it need
to understand Zero Trust concepts, principles, and goals.
Create a cross-functional team of business leaders (business
and technical decision makers), IT, information security, infrastructure,
application developers, and other stakeholders. The team defines
and identifies each attack surface and its users, applications,
and infrastructure, with the greatest focus on the most critical assets.
This includes understanding which applications access critical data,
which users access those applications, the data that you’re protecting,
and the user devices and infrastructure, including IoT devices.
The cross-functional team prioritizes what to protect based on
your business, and researches, plans, and implements the Zero Trust
strategy. The team remains involved in maintaining the deployment
as the business changes. Business leaders can speak to desired business
outcomes, compliance requirements, and the value of business assets.
When you gain a basic understanding of Zero Trust from Palo Alto Networks Zero Trust website and
this document, and have an idea of your goals, you can:
- Leverage the Palo Alto Networks Zero Trust Advisory Service, which guides you through:
- A vendor-agnostic Zero Trust architecture and strategy, including a roadmap to take your enterprise from its current security state to a Zero Trust state.
- Zero Trust policy design and implementation, where you design and implement a Zero Trust security policy.
- Monitoring, maintaining, and enhancing your Zero Trust security policy.
- This best practices document includes Zero Trust Resources, which provides links to Zero Trust, best practices, and other resources to help you reach your Zero Trust goals.
- The Zero Trust Reference Architecture Guide contains more specific details about Zero Trust implementation.
- Follow The Five Steps to Approaching Zero Trust to create your Zero Trust enterprise and secure users, applications, and infrastructure across all four validation points (identity, device/workload, access, and transaction).
- Start the transition with your most critical business assets to protect them first with Zero Trust. Move from the highest priority assets to the lowest priority assets until your enterprise is protected.As the importance of applications diminishes, you can be less aggressive with protection. For example, you don’t need to apply the same protection to a chat app as you need to apply to business-critical apps. Collaboration with business leaders helps determine which applications are the most critical to protect.
Palo Alto Networks offers a comprehensive platform of tightly
integrated tools that enable you to plan, architect, prepare for,
and implement Zero Trust to apply consistent security policy to
every part of your enterprise, for every use case, everywhere.
Capability | Platform Tools |
---|---|
Network Security Platform Next-Generation Firewalls (Security
policy and access enforcement for all use cases) |
|
Cloud Native Security Platform |
|
Managed Endpoint Protection |
|
Unmanaged Endpoint Protection |
|
Centralized Management (all use
cases) | |
Identity (all use cases) |
|
Application Visibility and Control (all
use cases) |
|
Threat Prevention and Cloud-Delivered Security
Services (all use cases) | To inspect and prevent threats in
encrypted traffic, you must decrypt the traffic or the firewall
can’t inspect the payload. You must also configure threat profiles
(Vulnerability Protection, Antivirus, Anti-Spyware, File Blocking,
DLP, WildFire, and URL Filtering) and attach them to Security policy
rules.
|
Security Policy Control and Automation (all
use cases) | In addition to granular Security policy
rules that enable you to control layer 7 traffic by source (user,
IP address, zone, device), destination (IP address, zone, device),
application, service, and URL category:
|
Consulting and Transformation Services |
|
Prisma Access delivers ZTNA 2.0, which uses many of the
tools and capabilities described in the table to enforce least privilege
access (CIE, User-ID), continuous trust verification (User-ID, App-ID,
MFA), continuous security inspection (Advanced Threat Protection,
Advanced URL Filtering, SaaS Security, DNS Service, WildFire), data
protection (DLP), and endpoint protection (Cortex XDR, GlobalProtect,
Device-ID, IoT Security), all delivered from the cloud to provide
consistent security in all use cases.