10
Zero Trust An Alternative Network Security Model Palo Alto Networks Approach Mark Harman Federal Cyber Architect

USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

Zero TrustAn Alternative Network Security Model

Palo Alto Networks Approach

Mark Harman

Federal Cyber Architect

Page 2: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

Agenda

• What is Zero Trust

• Why Palo Alto Networks/ Deep Rich Context

• Examples

• Steps to Zero Trust

• We all need friends

Page 3: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

What is Zero Trust…

• Zero trust is a security model based on the principle of maintaining strict

access controls down to the application and not trusting anyone or any port by

default, even those already inside the network perimeter.

• Zero Trust, rooted in the principle of “never trust, always verify,”

• Leveraging micro-segmentation and granular perimeters enforcement,

based on user, data and location

• Adopt a least-privileged access strategy and strictly enforce access control

• “Always verify,” meaning inspect and log all traffic with deep rich context.

3 | © 2019 Palo Alto Networks, Inc. All Rights Reserved.

Page 4: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

Why do we need deep rich context….

Time

Context

Enough context is

available to make

a confident decision

Today’s average

Time until Decision

w/ Full Context View (ie..Splunk app )Desired

Weeks

A forced decision here

could have you

“chasing ghosts” (FPs)

Minutes

Page 5: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

What is Deep Rich Context, Palo Alto Networks style;

• AppID

• UserID and Group

• ThreatID (IPS/IDS)

• URL and URL Category

• Zero Day (Malware, Begin or Greyware)

• DLP (contains CC, SSN, etc.)

• File Info (sha256, type, etc.)

• Endpoint OS (patched, drive encrypted, AV)

5 | © 2018, Palo Alto Networks. All Rights Reserved.

From Next-Generation Firewall

Traps

Magnifier

From

From

XDR

• Exploit, Ransomware and malware prevention

• ML and AI to detect and respond to sophisticated attacks

• Zero Day (Malware, Begin or Greyware)

• Prevention offline and online

• 1000+ behaviors

• ML semi-supervise

• Full chain of events (including network)

• Tags (Actors, Campaigns, Exploits, Tools, IOCs)

GlobalProtect

Analysis

Page 6: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

Example 1 of deep context

6 | © 2019 Palo Alto Networks, Inc. All Rights Reserved.

Page 7: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

Leadership now knows Ops Risk—and can Build and Spend Accordingly

7 | © 2019 Palo Alto Networks, Inc. All Rights Reserved.

Who

How

Where

Page 8: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

The 5 steps to a Zero Trust network

• Define your Protect Surface

• Map the transaction flows

• Architect a Zero Trust network

• Create Zero Trust Policy

• Monitor and maintain the network

Logging ServiceMagnifier

Next-Generation Firewall

WildFire Threat Prevention URL Filtering Aperture

Logging Service

Next-Generation Firewall

TrapsMagnifier

GlobalProtectLogging Service

Next-Generation Firewall

TrapsMagnifier

AutoFocusLogging Service MineMeldMagnifier evident

Page 9: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

PARTNER ECOSYSTEM

9 | © 2018, Palo Alto Networks. All Rights Reserved.

ORCHESTRATION & SECURITY

AUTOMATION

ENTERPRISE SECURITY IDENTITY& ACCESS MANAGEMENT

NETWORKING

SD-WANSECURITY ANALYTICS

MOBILITY

VIRTUALIZATION

CLOUD

THREAT INTELLIGENCE

IOT

Page 10: USING THE TEMPLATE AND GUIDELINES...w/ Full Context View (ie..Splunk app ) Desired Weeks A forced decision here could have you “chasing ghosts” (FPs) Minutes What is Deep Rich

THANK YOU

Twitter: @PaloAltoNtwks