ZT Planning Flashcards

1
Q

What are the core ZT principles for Zero-Trust Planning

A
  1. Never trust, always verify
  2. Inside-out security
  3. Risk-based security approach (assuming budget scarcity use risk to allocate budget)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What differences do you see in ZT planning and implementation between large and small companies?

A

Large organizations may pursue a portfolio of ZT initiatives with different motivations/success criteria
Small organizations may only have a single ZT effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which five steps should be considered initially when planning ZT

A
  1. Define the protect surface
  2. Map the transaction flows
  3. Build a ZTA
  4. Create a ZT policy
  5. Monitor and maintain the network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the CISA high-level ZT Maturity Model consist of?

A

The CISA High-Level ZT Maturity model consists of:
1. Five pillars
2. Three cross-cutting concerns
3. Four maturity levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three cross-cutting concerns in the CISA ZT Maturity Model

A
  1. Visibility and Analytics
  2. Automation and Orchestration
  3. Governance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which stage is the starting point for a ZT transformation?

A

The ‘traditional’ model is the starting point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four stages in the CISA ZT MM?

A
  1. Traditional - no implementation of ZT
  2. Initial - starting to move to ZTA but still lacks essential features
  3. Advanced - Essential capabilities in place
  4. Optimal - continuous monitoring and optimization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the five pillars of the CISA ZT MM

A
  1. Identity
  2. Devices
  3. Network
  4. Applications and workloads
  5. Data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should the primary focus during ZT planning be?

A

Aligning activities and resources to achieve business outcomse with acceptable risk levels defined by the board of directors and senior leadership

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which are initial considerations for planning the implementation of ZT philosophy, approach, and design principles?

A
  1. The maturity level of the organization’s security approach
  2. The complexity of service architecture and data flows
  3. The risk appetite and regulatory environment of the organization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which assets may ZT migration tactics and design principle applied to based on the organization’s risk profile and risk appetite?

A

All assets in the organization
A limited set of assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples key factors to be considered during ZT planning?

A

Stakeholders to engage
Technology strategy
BIA results
Risk Register
Supply chain risk management
Organizational security policies
Architecture options
Compliance requirements
Workforce training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is stakeholder identification critical?

A

It requires significant, concerted time/energy investment
It can make or break an organization’s ZT effort

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of stakeholders to be considered?

A

Business/service owners
Application/data owners
Infrastructure/asset owners
Service architecture owners
CISO/security teams
Legal officers
Compliance officers
Procurement officers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What must be done once stakeholders are identified?

A

Planning efforts should map out respective responsibilities (RACI chart)
Communications plan development

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the most critical ZT-specific role?

A

The asset owner:
- Determines valide users/roles/privileges/data usage
Typically exist in the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are best practices for stakeholder invovlement?

A

Should not lose focus on other internal users/groups
Must consist of stakeholders across organization and levels, including functional areas
Bring stakeholders in early, keep them engaged
Should be well-informed of organization’s collective mission/ongoing priorities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the role of an asset custodian?

A

Asset custodians implement directives set by asset owners
Asset custodians are usually in IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What should communications plan in ZT contain at a minimum?

A

Define a communication strategy, establish cadence
Incorporate mechanisms for setting proper expectations
Means to communicate/document key decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a technology strategy?

A

A technology strategy describes how technology is being used to achieve business objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Questions to ask about ZT and technology strategy?

A
  1. How does the ZT strategy fit into the organization’s technology strategy?
  2. How does the ZT strategy need to be updated to incorporate the technology strategy?
  3. How does the ZT strategy impact existing plans/processes/procedures?
  4. How does ZT strategy affect existing budgets/investments?
  5. How does ZT strategy affect existing internal standards/best practices?
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does a BIA typically provide?

A

Asset list with
- relative values/owners
- RPO/RTO
- Interdepencies/prorities
Assessment of resources required to restore/maintain each asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How does the risk register help ZT planning?

A

It provides:
- Inventory of potential risk events, recorded/tracked by likelihood/impact/description
- Controls for reducing risk within risk appetite thresholds
- The risk owner and the control owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which organizational policies will typically require an update when ZT is introduced?

A

Organizational policies affecting identity, devices, networks, applications and workloads, and data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the three categories of policies to consider when planning ZT?

A

Policies that dictate or constrain the ZT initiative
Policies that require updating due to ZT
Policies that need to be created to support ZT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which policy types are generally. needed for ZT?

A

General and IT security
ZT
Data governance
Cloud
Key management policy
Incident response
IAM
Monitoring
DR/BC

27
Q

In which ways is a ZT approach helpful for compliance?

A

Increased control over regulated data
Better overall cybersecurity

28
Q

How should training deal with ZT?

A

Training is foundational to ZT initiatives
ZT should be part of the awareness progams

29
Q

Who will need specific training on ZT?

A

Staff who determines access controls
Staff who configures access controls
Support team
Auditing staff
Upper management, board and CEO to ensure necessary awareness levels

30
Q

Stakeholder identification effors should result in a responsibility matrix known as a

A

RACI chart

31
Q

RACI stands for

A

Responsible, Accountable, Consulted, and Informed

32
Q

What should governing documents approved by senior management and the board of directors contain as a starting point for identifying stakeholder responsibilities?

A

Designate the executive sponsor and provide insights into reporting expectations

33
Q

What do RPO and RTO stand for?

A

RPO: Recovery Point Objectives
RTO: Recovery Time Objectives

34
Q

What should organizations starting with ZT planning start with?

A
  1. Prerequisite for understanding the protect surface
  2. Definition of the ZT project’s scope/priorities
  3. Business case development
35
Q

What is prerequisite to understanding the protect surface?

A

Undersatnding what the organization wants to protect with ZT:
Data/assets, data location, asset where data is hosted, services/processes/classifications.
This requires:
Data & asset discovery and inventory
Data & asset classification
Entities/user discovery and inventory

36
Q

What are data and assets classified on?

A

Data sensitivity

37
Q

What are meant with entities?

A

Person and non-person users (machines, APIs, service accounts)

38
Q

What is done with the discovered entities?

A

Discovered entities are mapped to all relevant protect surfaces. Identities are used to define the ZT policies.

39
Q

What will scope typically include?

A

Success criteria identified for the ZT projects
Business units identified for the ZT journey
The business units’ protect surfaces
The protect surface’s data and assets
Identities accessing the protect surface
Entities mapped to the identities/personas

40
Q

Approaches to prioritization:

A

Based on complexity: start simple, move to more complex
Based on risk: select protect surface high on the risk register
Based on use case: when a definite use case is identified

41
Q

What are factors to consider in the business case?

A

BIA
Risks that ZT program is designed to address
Cost of the project
Cost of not doing the project
What the organization stands to gain through ZT
Additional benefits from improving security culture

42
Q

Use case examples for ZT

A

Role based access control for internal staff
Remote Access
Services Accessed using Mobile Devices
Third-Party Service Providers
Staff Access to Assets in hybrid environments
SaaS & PaaS
Application release & DevOps
ICS, OT, & IoT

43
Q

What is a gap analysis?

A

A gap-analysis is an industry-accepted tool for helping organizations realize their objectives.
It consists generally of four steps:
- Determine current state
- Determine target state
- Create a roadmap to close the gap
- Requirements

44
Q

What are crucial steps for determining the ZT current state?

A
  1. Define current protect surfaces and implications for each ZT pillar
  2. List current controls for each pillar
  3. Determine/declare the current CISA maturity stage for each pillar
  4. Risk appetite determination feeds into scoping activities/decisions
45
Q

What is the goal of determining the ZT target state?

A
  1. Define the protect surface and the impact for each in-scope pillar across the organization
  2. Determine/declare the desired target CISA maturity stage per pillar
46
Q

What does the roadmap for moving from ZT current state to ZT target state contain?

A

The roadmap contains the future controls required to raise the current maturity stage to the future desired state

47
Q

What is the role of requirements in ZT planning?

A

ZTA implementation are a key output of the gap analysis

48
Q

Which requirements areas should typically be defined for ZTA?

A
  1. Source of truth for unique identities
  2. Full life cycle identity management for employees, contractors and vendors
  3. Definition, provisioning and management of entitlements
  4. Definition, provisioning and management of access controls
  5. Segmentation/micro-segmentation
  6. Incident detection and response
  7. Reporting and analytics
  8. Special considerations
  9. Concept of least privilege
  10. Segregation of duties
49
Q

Which considerations are relevant for the identity pillar of the target architecture?

A

Proper identity validation of the entity requesting access to a resource
Frequency/technology determined by sensitivity of information being accessed
MFA for validating identity of the entity
Real-time machine learning to highlight unusual user/device behavior
Identity stores with entities and associated information, queried during authentication process
Process for ensuring user identities are mapped to real users
Accuracy of claims controlled during the user lifecycle
Integration of PKI with the identity system

50
Q

Which considerations are relevant for the devices and endpoints pillar?

A

Devices/endpoints require authentication validation before accessing ZTA-protected resources
Security posture validated against security policies before being allowed access
Validation steps performed continuously
Device behavior analyzed for any unusual activity
Complete and accurate inventory of all devices/endpoints is highly sought-after goal
Failures primarily due to vast number/relatively short life cycle of deployed devices\Helps achieve device and endpoint data quality goals
Gateway/VDI solutions should be explored (for unmanaged devices and contractors)

51
Q

Which considerations are relevant for the network & environment pillar?

A

Micro-segmentation coupled with encryption to improve network security posture
Data plane used for application/service communication
Control plane used for network communication control
Decision to allow application access made over the control plane
Application interaction/data exchange with requesting device occurs via data plane
Micro-segmentation technologies and traffic segmentation based on data flow

52
Q

Which considerations are relevant for the workload & application pillar?

A

Access authorization continuously evaluated with real-time risk analysis
Security testing implemented in all stages of CI/CD
Integration into monitoring system for sending internal insights

53
Q

Which considerations are relevant for the data pillar?

A

Data classification policy should codify required data security controls/processes per defined data class
Can include secure encryption and network segmentation for highly sensitive data
Should include how entities gain access to data and required steps for end-of-life data disposal

54
Q

Which considerations are relevant for the visibility & analytics capability?

A

UEBA for continually evaluating user behavior against a baseline of previous activity
Running regular device posture assessments to ensure accessing devices are properly configured/secured
Monitoring application health/security by leveraging systems/sensors external to the application

55
Q

Which considerations are relevant for the automation & orchestration capability?

A

Takes advantage of automation by using infrastructure-as-code and CI/CD
Orchestrating/automating the identity lifecycle
Dynamic user identity and group membership/JIT application access

56
Q

Which considerations are relevant for the governance capability?

A

Helps define ZTA policies
Manages/reduces complexity with focus on protect surfaces
Governance policies should be enforced by the PEP

57
Q

Which categories do ZTA generally fall into?

A
  1. ZTA using enhanced identity governance
  2. ZTA using micro-segmentation
  3. ZTA using network infrastructure and SDP
58
Q

Which architecture variations are listed by NIST SP 800-207?

A

Device agent/gateway-based deployment
Enclave-based deployment
Resource portal-based deployment
Device application sandboxing

59
Q

How is a transaction defined in the context of ZT?

A

Any action within a system that needs verification

60
Q

Which questions are relevant for each step in the transaction?

A

Who, what, where, when, how, and why

61
Q

What needs to be considered when collecting data?

A

Begin with an initial understanding of the data
What it is, where it is, and where it goes
Start with existing knowledge about the organizations business process and underlying architecture
Leverage numerous sources (packet captures, logs, traffic analysis)

62
Q

When should a transaction inventory be created?

A

New deployments - transaction inventories defined/developed during architecture/design phase
- Organizations should create inventory as part of planning exercises
Existing deployments - collect/inventory known transactions to maintain
- Highlight transactions that will change or become deprecated
- Create entries for new transactions expected to be part of the solution