Practical Implementation Scenario and Use Cases15 minutes to read
Zero Trust security is a security model that assumes that all users, user devices, and resources are untrusted by default. This approach requires organizations to verify the identity of all users, devices, and resources before granting users access to resources with the organization's data, thus resulting in safeguarding the organization's data from threats and anomalies. Implementing Zero Trust can seem daunting, but it is crucial for organizations to adopt a Zero Trust model to protect their sensitive data from external breaches and cyberattacks. From this document, you will explore a practical Zero Trust implementation scenario in an organization and examine case studies that led to the result of successful Zero Trust implementations. 1. Zero Trust Implementation Scenario in an OrganizationImagine an organization with the below hierarchical scenario and strength:
Case: John - The IT administrator of the above organization is struggling to manage and grant access privileges to many individuals, including regular employees, interns, trainees, and higher management and human resources personnel. Additionally, he faces challenges in managing user and privileged devices, protecting against threats from sophisticated attackers and algorithms, restricting access to non-compliant devices, and monitoring user activity and access to privileged devices. Without an approach like Zero Trust, these difficulties can lead to security vulnerabilities and unauthorized access to sensitive information. Hence John plans to enforce the policy-based access privilege (Zero Trust approach) via PAM360. Organization Requirements
Step 1 - Installing Zero Trust AgentTo validate the user device and resource credibility using the user device and resource state, some certain parameters from them should be fetched for validation. To fetch those details for validation to policy-based access privilege, John will:
Step 2 - Configuring Trust Score ParametersJohn will then navigate to the Admin >> Zero Trust >> Configuration page to define conditional parameters for the user authentication, user device, and resources for calculating trust scores based on the organization's requirements and standards. John defines the following conditional parameters (only for reference) that follow: Note: To know more about configuring parameters in detail, refer to this help section. User Score Parameters
Resource Score Parameters
| ||||||||||||||||||||||||||||||||||||||||||||