Ebook - Implementing Zero Trust SASE
Ebook - Implementing Zero Trust SASE
Ebook - Implementing Zero Trust SASE
Implementing Identity-based
Zero Trust and SASE Architectures
HOW TO USE NETWORK ACCESS CONTROL TO PROTECT THE ORGANIZATION
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
Table of contents
3 Why security must evolve
4 Zero Trust and SASE rely on identity
6 Know what’s on your network
7 Ensure consistent authentication for assigning privileges
8 Enforce configuration compliance
9 Leverage identity to dynamically segment network traffic
11 Build deep integration with the security ecosystem
12 How Aruba can help: Edge-to-cloud security solutions
14 Summary
2
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
3
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
4
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
1
Eliminate network blind spots. The goal is to discover and profile all devices connected to the network—
including IoT devices outside the purview of the network and security team.
2
Verify identity before allowing access. Starting with 802.1X, there are many authentication techniques to
ensure that only legitimate users and devices connect to the network, including emerging solutions for IoT devices.
3
Compare endpoint configuration to compliance baselines and remediate as needed. This allows the
security team to define and enforce configuration guidelines that reflect the application of the appropriate patches
and updates.
5 Continuously monitor the security state of the user and device and bi-directionally communicate
with other elements in the security ecosystem. Reduce or eliminate access rights if there are signs that a
network-connected user or device has been compromised.
5
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
6
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
7
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
8
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
Leverage identity to The ability to microsegment traffic based on identity and role
delivers two main benefits:
dynamically segment
Dynamic process: Role-based policy is assigned on the fly to
network traffic a wired port or wireless connection based on factors such as
the access method of the client. Contextual data—like time of
At the core of the NIST Zero Trust Architecture is a day, type of machine, etc.—can also be included so IT staff no
collaboration of two key network components: longer must use static attributes to control access.
• A Policy Engine/Administrator that defines the Fine-grained segmentation: This allows client traffic to be
conditions under which a user or device can connect to the segmented based on permissions in the access policy.
network and what access privileges they are entitled to, based Microsegmentation provides enhanced security and perfor-
on the authentication and compliance process they must go mance benefits, given that access controls can be much more
through granular than hard-to-manage VLAN assignments, and they are
enforced by the network infrastructure.
• A Policy Enforcement Point that interprets and enforces
the access instructions delivered by the Policy Engine Trust enforced by Dynamic Segmentation
Users and NIST Policy Applications and
Together they constitute real-time, or dynamic, traffic segmen- Devices Engine/Administrator Destinations
9
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
The proliferation of endpoints due to BYOD, workplace mobility, • Build access control policies that reflect
and IoT is driving a need for more fine-grained segmentation the organization’s security controls.
strategies to separate different profiles of users, devices, and
traffic on a global basis—beyond what traditional VLANs can • Map roles to identity at time of
offer. Modern network switches have expanded configuration and authorization and assign an access policy
policy enforcement choices to include industry standards such as based on role.
EVPN-VXLAN for more flexibility, global scale, and third-party
interoperability. EVPN-VXLAN enables businesses to connect
geographically dispersed locations using Layer 2 virtual bridging, and
has emerged as a popular networking framework largely due to the
limitations of traditional VLAN-based networks. VXLAN
encapsulates Layer 2 Ethernet frames in Layer 3 UDP packets,
meaning virtual Layer 2 subnets can span underlying Layer 3
networks and extend network segmentation across physical
locations.
10
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
11
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
How Aruba can help: The Aruba Edge Services Platform delivers
Zero Trust and SASE Edge-to-Cloud security solutions
The Aruba Edge Services Platform (ESP) supports Zero Trust and SASE architectures by delivering device discovery,
authentication, configuration enforcement, role-based access control, built-in policy-based traffic segmentation, and
continuous threat protection, all from a single solution comprising:
Aruba Central Client Insights: Policy Enforcement Firewall (PEF):
Security and networking teams are constantly watching for devices that are connected PEF is a stateful, Layer 7 firewall that can be enabled on Aruba wireless access points,
to the network outside the proper controls. Client Insights uses a full range of passive gateways, and controllers. PEF is the companion enforcement point for ClearPass policies
and active discovery techniques along with AI fingerprinting to ensure that every and enforces policy-based per-user and per-device traffic segmentation for wired, wireless,
device is located and profiled. and WAN connectivity.
12
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
networks to support tens of thousands of devices daily. Aruba’s compliance and apply updates to
ESP-based architecture will provide the Pentagon an automated guidelines are configuration and software
followed components
networking infrastructure that eliminates manual processes like Assign and All resource authentication and Dynamic Segmentation
port mapping and initial switch configuration. It is also expanding enforce access authorization are dynamic and enabled by:
its deployment of Aruba ClearPass Policy Manager for secure policies in the strictly enforced before access
network is allowed via coordination - ClearPass, PEF with
network access control across its networks. between a Policy Engine and a Aruba access points and
Policy Enforcement Point gateways
- Central NetConductor,
policy manager, and inline
enforcement via Aruba
switches and gateways
5. Communicate Provide real-time (or near ClearPass Policy Manager/
bi-directionally real-time) feedback on the Aruba 360 Security
with the secu- security posture of enterprise Exchange
rity ecosystem information systems; integrate
and respond to with security information and
attacks event management systems
13
SECURITY ZERO TRUST, VISIBILITY AUTHENTICATION COMPLIANCE ACCESS & INTEGRATION EDGE-TO-CLOUD SUMMARY
EVOLUTION SASE, & IDENTITY SEGMENTATION SECURITY
Summary
Networking solutions with intrinsic support for Zero Trust and SASE
architectures provide a strong, built-in security foundation. Without
comprehensive support for all five of the major security requirements,
organizations are faced with assembling complicated, unintegrated
solutions that leave gaps in their protection.
14
Thank You
Contact Us
© Copyright 2022 Hewlett Packard Enterprise Development LP. The information contained herein is subject to change without notice. The only warranties
for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing
herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omis-
sions contained herein.
ebk_security_RM_020122 a00118824enw