{"id":1293,"date":"2021-11-11T00:31:42","date_gmt":"2021-11-11T05:31:42","guid":{"rendered":"https:\/\/identityandaccesssolutions.com\/zero-cost-bench-copy\/"},"modified":"2021-11-15T00:11:16","modified_gmt":"2021-11-15T05:11:16","slug":"zero-trust-journey","status":"publish","type":"page","link":"https:\/\/elivebiz.com\/IAAS\/zero-trust-journey\/","title":{"rendered":"Zero Trust Journey"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1293\" class=\"elementor elementor-1293\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-850c37e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"850c37e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-134ec2d\" data-id=\"134ec2d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-120cd87 elementor-widget elementor-widget-text-editor\" data-id=\"120cd87\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"title-head\"><h6>We Bring Expertise<\/h6><h2>A Trusted Partner on Your Zero Trust Journey<\/h2><h5>Achieve Success with Your Integrated Access, PAM, IGA and Endpoint Management<\/h5><p>Zero Trust (ZT) is a new mandate and a cybersecurity best practice for both federal and enterprise cybersecurity. Evaluating, planning and implementing a Zero Trust Architecture (ZTA) is not a trivial endeavor! It requires careful planning with multiple vendor solutions needed to ensure complete success.<\/p><p>IAAS has the winning combination of vetted <b>talent for hire with appropriate expertise <\/b>and we are a certified <b>partner with the leading technology solutions needed <\/b>to ensure our customers will have a successful ZT journey.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-afc3687 inn-lft-wwd\" data-id=\"afc3687\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3209b62 rght-seg elementor-widget elementor-widget-image\" data-id=\"3209b62\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/07\/zero-cost-bench-iaas.jpg\" class=\"attachment-large size-large wp-image-241\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f6470d4 zero-cost elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f6470d4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-94ace64 inn-lft-wwd\" data-id=\"94ace64\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-913b46c rght-seg elementor-widget elementor-widget-image\" data-id=\"913b46c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/07\/cybersecurity-1.jpg\" class=\"attachment-large size-large wp-image-252\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e9c9f11\" data-id=\"e9c9f11\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eb0b54f elementor-widget elementor-widget-text-editor\" data-id=\"eb0b54f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"title-head\"><h2>Zero Trust Technology<\/h2><\/div><p>To fully implement ZT in your enterprise on-premises and in the cloud, multiple IAM technologies are required, including but not limited to:<\/p><ul><li><span style=\"color: #858383;\">Access<\/span><ul><li><span style=\"color: #858383;\">Provisioning, MFA, SSO, Directory Security\u00a0<\/span><\/li><\/ul><\/li><\/ul><ul><li><span style=\"color: #858383;\">Privileged Access Management (PAM)<\/span><\/li><\/ul><ul><li><span style=\"color: #858383;\">Identity Governance &amp; Administration (IGA)<\/span><ul><li><span style=\"color: #858383;\">Role-Based Access Controls<\/span><\/li><\/ul><\/li><\/ul><ul><li style=\"font-family: 'Noto Sans KR', sans-serif; font-size: 15px; line-height: 24px; color: #666666; font-weight: 300;\"><span style=\"color: #858383;\">Endpoint Least Privilege<\/span><\/li><\/ul><h4>\u00a0<\/h4><h4>\u00a0<span style=\"color: #666666; font-family: Noto Sans KR, sans-serif;\"><span style=\"font-size: 15px; font-weight: 300;\">\u00a0<\/span><\/span><\/h4>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1141cac zero-cost elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1141cac\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2c62457\" data-id=\"2c62457\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-044d5c7 elementor-widget elementor-widget-text-editor\" data-id=\"044d5c7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"title-head\"><h2>What is Zero Trust?<\/h2><\/div><p>The <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.nist.gov\/publications\/zero-trust-architecture\" target=\"_blank\" rel=\"noopener\">National Institute of Standards &amp; Technology (NIST)<\/a><\/span> is the leading government authority and commercial influencer on Zero Trust infrastructure &amp; architecture. <b>Here is NIST\u2019s definition of Zero Trust:<\/b><\/p><p>Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources.<\/p><p>A zero trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned).<\/p><p>Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e492fb9 inn-lft-wwd\" data-id=\"e492fb9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c7cb1c4 rght-seg elementor-widget elementor-widget-image\" data-id=\"c7cb1c4\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/what-is-zero-trust.jpg\" class=\"attachment-large size-large wp-image-1341\" alt=\"\" srcset=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/what-is-zero-trust.jpg 450w, https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/what-is-zero-trust-300x300.jpg 300w, https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/what-is-zero-trust-150x150.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2eeb3bc zero-cost elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2eeb3bc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5342c70 inn-lft-wwd\" data-id=\"5342c70\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6cf29a2 rght-seg elementor-widget elementor-widget-image\" data-id=\"6cf29a2\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/zero-trust-architecture.jpg\" class=\"attachment-large size-large wp-image-1345\" alt=\"\" srcset=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/zero-trust-architecture.jpg 450w, https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/zero-trust-architecture-300x300.jpg 300w, https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/zero-trust-architecture-150x150.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6a6ddea\" data-id=\"6a6ddea\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6404f6 elementor-widget elementor-widget-text-editor\" data-id=\"b6404f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"title-head\"><h2>Zero Trust Architecture<\/h2><\/div><p>The National Institute of Standards &amp; Technology (NIST), the leading government authority and commercial influencer on Zero Trust infrastructure and architecture, has outlined the tenants of ZT in <a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207.pdf\" target=\"_blank\" rel=\"noopener\"><u><i>Special Publication SP 800-207, Zero Trust Architecture<\/i><\/u><\/a>:<\/p><p><b>The Tenets of Zero Trust:<\/b><\/p><p>1.All data sources and computing services are considered Resources<\/p><p>2.All communication is secured regardless of network location<\/p><p>3.Access to individual enterprise resources is granted on a per-session basis<\/p><p>4.Access to resources is determined by a dynamic policy \u2013 including the observable state of client identity, application\/service, &amp; the requesting asset, and may include other behavioral &amp; environmental attributes<\/p><p>5.The enterprise monitors &amp; measures the integrity and security posture of all owned &amp; associated assets<\/p><p>6.All resource authentication &amp; authorization are dynamic and strictly enforced before access is allowed<\/p><p>7. The enterprise collects as much info as possible about the current state of assets, network infrastructure &amp; communications and uses it to improve its security posture.<\/p><h3>\u00a0<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8d45cd6 zero-cost elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8d45cd6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-6e7325f\" data-id=\"6e7325f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-420d974 elementor-widget elementor-widget-text-editor\" data-id=\"420d974\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"title-head\"><h2>Zero Trust<\/h2><h2>Online Resources<\/h2><\/div><p><span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207.pdf\" target=\"_blank\" rel=\"noopener\">The National Institute of Standards &amp; Technology (NIST)<\/a><\/strong><\/span><\/p><p><a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>Presidential Action on Improving National Cybersecurity (Federal Government)<\/strong><\/span><\/a><\/p><p><span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.cisa.gov\/blog\/2021\/09\/07\/no-trust-no-problem-maturing-towards-zero-trust-architectures\" target=\"_blank\" rel=\"noopener\">Cybersecurity &amp; Infrastructure Security Agency (CISA)<\/a><\/strong><\/span><\/p><p><span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.csoonline.com\/article\/3626432\/7-tenets-of-zero-trust-explained.html\" target=\"_blank\" rel=\"noopener\">CSO Online \u2013 Tenets of Zero Trust Explained (Trade Publication)<\/a><\/strong><\/span><\/p><h5><b>IAAS technology partners:<\/b><\/h5><p><span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.centrify.com\/resources\/ebooks\/zero-trust-privilege-for-dummies\/\" target=\"_blank\" rel=\"noopener\">Centrify: Zero Trust Security for Dummies (PAM\/Identity Security Vendor)<\/a><\/strong><\/span><\/p><p><span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.sailpoint.com\/identity-library\/what-is-zero-trust\/\" target=\"_blank\" rel=\"noopener\">SailPoint: What is Zero Trust? (IGA\/Identity Security Vendor)<\/a><\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-475f8ad inn-lft-wwd\" data-id=\"475f8ad\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a856c55 rght-seg elementor-widget elementor-widget-image\" data-id=\"a856c55\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"450\" height=\"450\" src=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/zero-trust-online-resources.jpg\" class=\"attachment-large size-large wp-image-1349\" alt=\"\" srcset=\"https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/zero-trust-online-resources.jpg 450w, https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/zero-trust-online-resources-300x300.jpg 300w, https:\/\/elivebiz.com\/IAAS\/wp-content\/uploads\/2021\/11\/zero-trust-online-resources-150x150.jpg 150w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>We Bring Expertise A Trusted Partner on Your Zero Trust Journey Achieve Success with Your Integrated Access, PAM, IGA and Endpoint Management Zero Trust (ZT) is a new mandate and a cybersecurity best practice for both federal and enterprise cybersecurity. Evaluating, planning and implementing a Zero Trust Architecture (ZTA) is not a trivial endeavor! It [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":235,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"zerocostbench.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1293","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/pages\/1293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/comments?post=1293"}],"version-history":[{"count":94,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/pages\/1293\/revisions"}],"predecessor-version":[{"id":1395,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/pages\/1293\/revisions\/1395"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/media\/235"}],"wp:attachment":[{"href":"https:\/\/elivebiz.com\/IAAS\/wp-json\/wp\/v2\/media?parent=1293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}