- Community Home
- >
- HPE Networking
- >
- Networking
- >
- Building a zero trust Enterprise Architecture in f...
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark as New
- Mark as Read
- Bookmark
- Receive email notifications
- Printer Friendly Page
- Report Inappropriate Content
Building a zero trust Enterprise Architecture in four steps
To enhance agility, scalability, and cost-efficiency, organizations are increasingly moving to cloud-centric architectures. However, this shift introduces new security challenges, requiring innovative approaches to protect data and systems from evolving cyber threats. Integrating Enterprise Architecture (EA) with zero trust principles and Secure Access Service Edge (SASE) provides a comprehensive strategy to build a secure architecture. This approach not only mitigates cyber threats but also ensures compliance with industry standards and regulations.
The role of Enterprise Architecture
Enterprise Architecture (EA) is a strategic framework that aligns IT infrastructure with business capabilities and objectives. This alignment helps organizations plan and manage their IT assets to support business goals effectively, such as enhancing customer experience, improving operational efficiency, and driving innovation. EA provides a holistic view of an organization's technology landscape, ensuring that IT investments align with the company’s strategic direction and comply with regulation mandates.
Zero trust is a security framework based on the principle of "never trust, always verify." It emphasizes strict identity verification and continuous monitoring, regardless of whether the user is inside or outside the network perimeter. Integrating zero trust principles into EA ensures that security is embedded e into IT planning.
This blog post outlines a four-step methodology for building a zero trust Enterprise Architecture:
Step 1: User and device identification
The foundation of a secure architecture begins with accurately identifying and authenticating users and devices accessing the network. This process goes beyond traditional Identity and Access Management (IAM) by incorporating AI-powered visibility to detect unmanaged devices and IoT endpoints.
With the proliferation of Internet of Things (IoT) devices and Bring Your Own Device (BYOD) policies, organizations need advanced tools to monitor and manage a diverse range of devices. AI-powered visibility leverages machine learning models to profile and identify devices in real-time, ensuring that only trusted devices gain network access.
To implement a zero trust architecture, EA creates a detailed inventory of all devices connected to the network, including servers, endpoints, IoT devices. This inventory serves as a foundational asset repository to classify devices based on their roles, characteristics, and security attributes. Also, Enterprise Architecture diagrams the network topology, illustrating the relationships between devices and segments. This mapping provides insights into the network architecture, helping in visualizing the attack surface and implementing segmentation strategies to contain and isolate network traffic.
Step 2: Securing access
After identifying and authenticating users and devices the next step is enforcing role-based access control through micro-segmentation. Micro-segmentation divides the network into smaller, isolated segments, allowing granular control over user access to applications and data. This approach limits lateral movement within the network, reducing the potential impact of a security breach.
Enterprise Architecture can facilitate this process by leveraging application inventory and Configuration Management Databases (CMDB) to map user roles to specific applications and services and segment the network. This mapping ensures that access controls are precise and aligned with business needs.
SASE (Secure Access Service Edge) is a network architecture that combines WAN capabilities with cloud-delivered security functions (SSE or Security Service Edge), to provide secure access to applications and services regardless of user location. SSE functions include ZTNA (Zero Trust Network Access), SWG (Secure Web Gateway) and CASB (Cloud Access Security Broker). ZTNA secures access to private apps by enforcing least privilege access and ensures users are only allowed access to applications they are explicitly authorized to use. Secure Web Gateway (SWG) secures access to the internet by protecting users from web-based threats. Cloud Access Security Broker (CASB) secures access to SaaS apps by identifying and monitoring sensitive data hosted in SaaS applications and enforcing data protection policies.
Enterprise Architecture streamlines the implementation of SASE by ensuring that it is aligned with the organization's overall security strategy and business objectives. EA also facilitates the integration of SASE into the existing IT infrastructure, providing seamless operation and maximum protection. By continuously evaluating and updating the security architecture, EA helps organizations stay ahead of emerging cyber threats, maintaining a robust security posture.
Step 3: Reducing shadow IT
As organizations increasingly rely on Software-as-a-Service (SaaS) applications, protecting sensitive data within these platforms has become crucial. In addition, employees often use cloud services without IT’s knowledge or consent, so that corporate data can be hosted in sanctioned or unsanctioned apps, making it critical for organizations to identify and reduce shadow IT.
CASB plays a vital role in reducing shadow IT by monitoring user activities and data transfers, while enforcing data protection policies. Enterprise Architecture also helps reduce shadow IT by rationalizing the IT portfolio through a comprehensive inventory of applications and technologies. By evaluating their alignment to business capabilities, redundant applications can be consolidated or eliminated, while outdated technologies can be phased out, thereby reducing technical debt. This assessment ensures that only necessary and secure IT assets are kept, aligning IT resources with business objectives, and reducing security risks.
Step 4: Compliance with regulations using zero trust principles
Achieving regulatory compliance is a critical aspect of building a secure architecture. Zero trust principles, integrated with Enterprise Architecture, provide a robust framework for meeting regulatory requirements and maintaining compliance.
Enterprise Architecture embeds regulatory requirements into the IT planning process. By aligning IT strategies with compliance mandates, organizations can design and implement security controls that meet regulatory standards. EA facilitates the creation of comprehensive security policies and procedures that address specific regulatory requirements, ensuring consistent compliance across the organization.
Additionally, zero trust principles emphasize continuous monitoring and validation of all users and devices accessing the network. This approach aligns with regulatory requirements for ongoing risk assessment and mitigation. By implementing continuous trust assessment mechanisms, organizations can adapt to changes in user behavior, device health, and access contexts in real-time, ensuring that compliance is maintained dynamically.
Conclusion
Adopting a zero trust architecture requires a holistic approach that integrates multiple components such as least privilege access, data protection and threat defense, while Enterprise Architecture facilitates its implementation. This comprehensive strategy not only mitigates cyber threats but also ensures compliance with industry standards and regulations. By following the four-step methodology outlined above, organizations can create a resilient security posture that supports their digital transformation goals.
Enterprise Architecture plays a pivotal role in this process because it helps align IT assets with business capabilities and objectives, reducing technical debt, and ensuring that security measures are integrated into the overall IT strategy. Combined with zero trust principles, this approach provides a robust foundation for a secure and compliant cloud environment. By continuously evolving and adapting to new threats and regulatory changes, organizations can safeguard their critical assets and achieve long-term success in the digital age.
Gabriel_Gomane
Gabriel Gomane has more than 15 years of experience in product marketing and product management, focusing primarily on networking, security and digital transformation. He has broad international experience, having held marketing positions based in Europe and in the US. Before joining HPE Aruba Networking, Gabriel worked for various high tech companies including Meru Networks and MEGA International. Gabriel holds a BS in engineering from Grenoble INP and an MBA from HEC Paris.
- Back to Blog
- Newer Article
- Older Article
-
AI-Powered
23 -
AI-Powered Networking
22 -
Analytics and Assurance
4 -
Aruba Unplugged
7 -
Cloud
9 -
Corporate
3 -
customer stories
4 -
Data Center
19 -
data center networks
19 -
digital workplace
2 -
Edge
4 -
Enterprise Campus
9 -
Events
5 -
Government
10 -
Healthcare
2 -
Higher Education
2 -
Hospitality
4 -
Industries
1 -
IoT
8 -
Large Public Venue
1 -
Location Services
3 -
Manufacturing
1 -
midsize business
1 -
mobility
17 -
Network as a Service (NaaS)
12 -
Partner Views
4 -
Primary Education
1 -
Retail
1 -
SASE
21 -
SD-WAN
12 -
Security
103 -
small business
1 -
Solutions
7 -
Technical
5 -
Uncategorized
1 -
Wired Wireless WAN
90 -
women in technology
2
- « Previous
- Next »