Citation Audit
Project 35871 –
Task 1106992
Instructions: | Task Description: Add Audit Question for the "Implement ZTA components (people, process, and technology) and incrementally leverage deployed security solutions ¶ 3" citation | Authority Document URL: Website URI Document URI |
Citation: Implement ZTA components (people, process, and technology) and incrementally leverage deployed security solutions ¶ 3 – Identity, authentication, and authorization are critical to making resource access decisions. Given that making and enforcing access decisions are the two main responsibilities of a ZTA, the organization will want to use its existing or a new ICAM solution as a foundational building block of its initial ZTA implementation. The organization should strongly consider implementing MFA in a risk-based manner for its users. An endpoint protection or similar solution that can assess device health and that integrates with the ICAM solution may also be another foundational component of an initial ZTA deployment. An initial ZTA based on these two main components will be able to use the identity and authorizations of subjects and the health and compliance of requesting endpoints as the basis for making access decisions. Additional supporting components and features can then be deployed to address an increasing number of ZTA requirements. Which types of components are deployed and in what order will depend on the organization's mission and business use cases. If data security is essential, then data security components will be prioritized; if behavior-based anomaly detection is essential, then monitoring and AI-based analytics may be installed. The ZTA can be built incrementally, adding and integrating more supporting components, features, and capabilities to gradually evolve to a more comprehensive ZTA. Control: CC ID 561 – Implement multifactor authentication techniques. |
Why are you sending the task back? (optional)