Seven Elements of Highly Successful Zta
Seven Elements of Highly Successful Zta
Highly Successful
Zero Trust Architecture
An Architect’s Guide to the
Zscaler Zero Trust Exchange
Authors
Nathan Howe, VP, Emerging Technology & 5G, Zscaler
Sanjit Ganguli, VP, Transformation Strategy & Field CTO, Zscaler
Gerard Festa, VP, Product Marketing, Zscaler
Contents
An Overview of Zero Trust 2
Section 1 - Verify 25
Element 1: Who is connecting? 26
Element 2: What is the access context? 37
Element 3: Where is the connection going? 48
Section 2 - Control 70
Element 4: Assess Risk (adaptive control) 72
Element 5: Prevent Compromise 81
Element 6: Prevent Data Loss 99
Edition 2.0 | Published 08/2022 Seven Elements of Highly Successful Zero Trust Architecture 1
An Overview
of Zero Trust
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 2
An Overview of Zero Trust
For the past three decades, organizations have been building and optimizing
complex, wide-area, hub-and-spoke networks for connecting branches and
factories to applications in the data center. The network was secured with a stack
of security appliances and firewalls using an architecture known as castle-and-moat
security. This was so named because the security stack created a network perimeter
(or moat) around the data center (or castle). This architecture prevented access to
anyone outside the network, but granted privileges to anyone within. This network
and security architecture served us reasonably well when applications lived in the
data center and users worked from the office.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 3
An Overview of Zero Trust
Figure 2:
Castle-and-moat and
hub-and-spoke architecture Internet
worked well when the data
center was the center of
the universe and all traffic
flowed through it.
Castle-and-Moat Security
Hub-and-Spoke Network
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 4
An Overview of Zero Trust
Internet
GCP AWS
Network Transformation
To deliver a productive
collaboration experience,
traffic must go direct.
Users Users
Castle-and-Moat Security
Work from Anywhere
Users moved off the network
and are connecting from
everywhere.
Figure 3:
Users can work from
anywhere and access
applications hosted in
a variety of locations.
Hub-and-Spoke Network
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 5
An Overview of Zero Trust
For internal applications hosted in IaaS and PaaS environments, the network must
be further extended to all in-use cloud providers. Doing so allows attackers to
inflict substantial impact on an enterprise in four steps.
Internet
Extend the
network to Virtual Virtual
IaaS/PaaS IaaS/PaaS
IaaS/PaaS Firewall Firewall
Extend the
network to
remote workers VPN VPN
Extend the
network to
remote sites Branch Factory
Data Center
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 6
An Overview of Zero Trust
Every interconnected network has an implicit trust in that anyone who can
access these networks can connect to any application residing on them. The
shared network context, be it internet-based users connecting via VPN,
workloads exposed for access (on any network), etc., ultimately leaves services
open to receive a connection. The moment a service requires access from an
initiator over a shared network, that service is exposed as an attack surface.
Internet
Every internet-
facing firewall
Virtual IaaS/PaaS IaaS/PaaS Virtual
is an attack
Firewall Firewall
surface.
Public IP
VPN VPN
Local breakouts
for user
experience,
cost savings Branch Factory
Data Center
Figure 5: They find you. Everything exposed to the internet is your attack surface.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 7
An Overview of Zero Trust
Internet
VPN VPN
Branch Factory
Data Center
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 8
An Overview of Zero Trust
Internet
VPN VPN
Branch Factory
Data Center
Figure 7: They move laterally, finding high-value targets for ransomware and other attacks.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 9
An Overview of Zero Trust
Ransomware at a glance
• Extortion: Attackers render enterprise information unusable and
demand money for its return.
• Double Extortion: Attackers threaten to release enterprise information
if not paid.
• Triple Extortion: Attackers leverage the stolen information to inflict
additional damage, e.g., DoS of the customer or the sale of customer
data in order to apply additional pressure.
Attackers continuously refine these tactics and have adopted double and
sometimes triple extortion techniques to increase their chances of collecting
payment by threatening to leak customer data or cripple operations.
Internet
Private or
Confidential Data
VPN VPN
Branch Factory
Data Center
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 10
An Overview of Zero Trust
NIST defines the underlying principle of a zero trust architecture as “no implicit
trust granted to assets or user accounts based solely on their physical or network
location (i.e., local area networks versus the internet) or based on asset ownership
(enterprise or personally owned).” It’s an overhaul of the old proverb “Never trust.
Always verify.”
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 11
An Overview of Zero Trust
Key architectural advantages of the zero trust approach versus legacy network
security are summarized in the figure below:
Firewall/Pass-through Proxy
Inspects a limited data buffer Full content inspection, including TLS/SSL
Proxy/Pass-through Unknown files pass through Hold and inspect unknown files before
Alerts after infection reaching the endpoint
Figure 9: High-level comparison of legacy network architecture versus zero trust architecture.
To fully understand zero trust architecture, it’s useful to break it down into
individual building blocks (or elements) that are executed before any connection
is established. These elements ensure that all enterprise services–user/devices,
IoT/OT devices, and workloads–are subject to the same set of controls when
requesting access to assets.
There are seven essential elements of zero trust architecture, grouped into
three categories:
1 2 3
VERIFY CONTROL ENFORCE
Identity and Context Content and Access Policy, Per-Session
Decision and
Enforcement
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 12
An Overview of Zero Trust
The full stack of control actions within a zero trust architecture can be found in
Figure 10.
External Internal
Data
SaaS Internet Center Factory IaaS/PaaS
Inside-out Connections
Connection initiated to an
Enforce app, not a network
Policy, Per-Session
Decision and Enforcement 7. Enforce Policy
Monitor Experience
6. Prevent Data Loss
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 13
Figure 10
An Overview of Zero Trust
1 Who is connecting? – This first element verifies the identity of the user/device,
IoT/OT device, or workload through integrations with third-party identity providers (IdPs)
as part of an enterprise identity access management (IAM) provider.
2 What is the access context? – This element validates the context of the
connection requester, looking at attributes such as the role, responsibility, request time,
location, and circumstances of the request. This profile data is collected from multiple
sources, including IdP and third-party integrations.
3 Where is the connection going? – This element confirms that the owner
of the verified identity has the rights and meets the required context to access the
requested application or resource based on segmentation rules. This entity-to-resource
segmentation is the cornerstone of zero trust.
4 Assess risk – This element leverages AI to dynamically compute a risk score for the
user/device, IoT/OT device, or workload based on factors including device posture, threats,
destination, behavior, and policy.
5 Prevent compromise – This element utilizes inline decryption and deep content
inspection of entity-to-resource traffic to identify and block malicious content.
6 Prevent data loss – This element also uses decryption and deep content inspection of
entity-to-resource traffic to identify sensitive data and prevent its exfiltration through inline
controls or by isolating access within a controlled environment.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 14
An Overview of Zero Trust
7
Enforce policy – This element uses the outputs of previous elements to determine
what action to take regarding the requested connection. This action can take multiple forms,
ultimately resulting in a conditional allow or conditional block.
Note that all seven elements may not be used for all policies or types of traffic. For
certain applications, such as VoIP, the choice may be to not inspect the content.
Each element in this process feeds into the next, creating a dynamic decision
tree that is utilized for each user/device, IoT/OT device, or workload-to-resource
request. Every connection must evaluate identity, profile, user risk, site risk,
posture, and content as criteria for deciding whether to grant access conditionally
or to conditionally block (see Figure 11).
None of the elements above can come at the expense of the user experience.
Zero trust architecture must therefore be able to monitor performance and
diagnose experience issues to ensure that these seven elements do not put
an undue burden on the user.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 15
An Overview of Zero Trust
External Internal
Conditional
Allow
Data
Allow, Prioritize, Isolate, SaaS Internet Center Factory IaaS/PaaS
Steer, Quarantine
Inside-out Connections
Connection initiated to an
Enforce app, not a network
Policy, Per-Session
Decision and Enforcement 7. Enforce Policy
FAIL
Content and Access
PASS
Figure 11
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 16
An Overview of Zero Trust
Castle-and-Moat and
Hub-and-Spoke Architecture
Users Users
Castle-and-Moat Security
Zero Trust
Exchange
OT
IoT
Factory Data
Center
Hub-and-Spoke Network
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 17
An Overview of Zero Trust
As seen in Figure 13, the Zscaler Zero Trust Exchange uses identity-based controls
to enforce policies that securely provide user-to-workload, third-party access,
workload-to-workload, and location-to-location segmentation. These zero trust
connections are brokered by the Zero Trust Exchange without ever granting broad
network access.
Devices
Iot/OT systems
IT Subnet
User: Workforce
Business Apps
IaaS/PaaS
IoT/OT Subnet
Workloads
VPC to VPC,
VPC to DC
Factory
Data Center
Subnet 1
Zero Trust
Exchange
Subnet 2 (Critical Apps)
Figure 13: The Zscaler identity-driven segmentation model uses business policies to connect
users/devices, IoT/OT devices, and workloads over any network to prevent lateral movement.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 18
Figure 13
An Overview of Zero Trust
So, how do the concepts of zero trust architecture, as described here, relate to the
broader concepts of SSE? They are closely intertwined. Gartner’s SSE provides a
framework that combines the main elements of network security–including the
Secure Web Gateway (SWG), Zero Trust Network Access (ZTNA), and a Cloud
Access Security Broker (CASB), among other components–as provided from
the cloud at a location near the end user. ZTNA in this context relates merely
to user-to-private application access, according to Gartner’s research.
Zero trust architecture, in this book, is a part of a much broader discussion beyond
Gartner and NIST’s narrower definitions. Zscaler has implemented zero trust as a
core architectural component of the Zero Trust Exchange (the name gives it away),
and it permeates through every element of the SSE framework. This includes a
zero trust approach for users accessing any application (internal or external),
IoT/OT connectivity, and workloads accessing resources in a multicloud
environment or on the internet itself. It includes not only verification but also deep
inspection and enforcement at every stage while dynamically controlling for risk.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 19
An Overview of Zero Trust
Real-time Reporting
Analytics/ AI / ML Driven User Behavior Analytics
Visibility Digital Experience
Identity
Zero Trust Architecture for SSE Secure Access
Service Edge
SASE
WAN Edge
SD-WAN or Router
Factory Branch HQ Home Cloud/Data Center
SSE is a subset of the larger SASE framework, also from Gartner, that includes
WAN edge components (like SD-WAN) alongside SSE components. Zscaler’s
network-agnostic platform works with any network underlay and leverages
integrations with SD-WAN vendors to provide users with a seamless experience.
The remainder of this guide will explore each zero trust element in detail, discuss
the technology required to accomplish it, highlight architectural considerations, and
illustrate how each is accomplished within the Zscaler Zero Trust Exchange. For
each element, we’ll follow two example users, John and Jane Doe, on their journey
through the zero trust process of accessing applications, including progress reports
tracking their progression.
Figure 14
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 20
Connecting
to the
Zero Trust
Exchange
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 21
Connecting to the Zero Trust Exchange
The Zero Trust Exchange is a highly available and globally distributed service,
so that connections are requested and enforced at the most effective location
to ensure the best user experience. The Zero Trust Exchange can also be run
wherever is most suitable for the enterprise, meaning that it can be within a
customer’s premises, cloud, or edge platform. This brings the power of the
Zero Trust Exchange as close to the consumer initiator as possible.
Zero Trust
Exchange
SD-WAN or Router
CC
Security VPC
VPC VPC
Figure 15: Representation of the mechanisms forwarding traffic to the Zscaler Zero Trust Exchange.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 22
Connecting to the Zero Trust Exchange
Site forwarding is meant to encompass all possible enterprise locations, from branches,
offices, factories, and warehouses to IaaS cloud-hosted workloads, etc. Zscaler has
additional form factors available to accommodate these enterprise locations.
Zscaler Branch Connectors facilitate secure communication from these sites and can
be deployed on-premises in locations like satellite offices and factories. Conversely,
Cloud Connectors offer connection mechanisms from IaaS and PaaS locations,
allowing protection for workload-to-workload (multicloud) and workload-to-internet
connections. Both the Branch and Cloud Connector variations allow bidirectional,
secure communication.
For unmanaged remote user devices, where an agent cannot be installed, DNS CNAME
redirects traffic to a protected, private portal. Users then authenticate against an IdP
to access web, RDP-based, and SSH-based applications. This is called Zscaler Browser
Access, and does not require any explicit forwarding mechanism. This functionality
prevents direct interaction with the services, while additional protection via browser
isolation inherently prevents threats from reaching the user/server as well as provides
data protection.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 23
Connecting to the Zero Trust Exchange
Once an inside-out connection is initiated with the Zero Trust Exchange, that
connection is terminated as the Zero Trust Exchange acts as a forward proxy. This
termination initiates the seven elements, as the connection is not pass-through.
Once the elements are completed, a new connection is established between the
Zero Trust Exchange and the application to complete the transaction.
Progress Report: Starting at zero, Jane and John Doe request access to applications X and Y.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 24
Section
1
Verify
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 25
6. Prevent Data Loss
Monitor Experie
Section 1 Verify
Control 5. Prevent Compromise
Content and Access
Verify
Verify 2. What is the access context?
Identity
Identityand Context
and Context
1. Who is connecting?
Connection Terminated
Who is connecting?
User + Device | Thing | Workload
User
User + Device
• Traffic Fingerprinting
• Certificate
IoT / OT
Figure 16:
This element asks who you are, which is
not a singular value. An identity needs to
be made up of various values, not just
a user’s individual identity.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 26
Section 1 Verify
Common security wisdom states that “nothing, absolutely nothing, should ever
implicitly happen.” No person or thing should be allowed to access or view
anything, not even the front door of the building, without first being verified and
their access rights assessed.
In other words, the requester must always be verified before access is granted.
Each requester should be treated individually and only granted access to what their
identity allows. It’s this initial identity verification that determines if a requester is
able to proceed farther down the zero trust path.
Identity, as we know the term today, was coined by the French mathematician
Marie Jean Antoine Nicolas de Caritat, Marquis de Condorcet (no chance of
messing up their identity), when trying to understand the relationship between
a person and the collective foundations of the systems the person was part of:
officially “the quality of being identical.”
Within the enterprise, this definition of identity is especially apt. Employees are
identified not only by who they are, but also assigned to groups that organize
them. This alignment of identity and identity-based access led the computing
industry to the revolutionary idea of least privilege–individuals should be granted
access to specific resources based on their role’s specific needs.
The specific, granular nature of identity is the cornerstone of zero trust and
the Zero Trust Exchange–not only for people, but also for devices, internet-
enabled things, and workloads. These entities must present a valid identity
to differentiate themselves in order to gain access to allowed resources via
the correct set of controls. All other access should be blocked.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 27
Section 1 Verify
The requesting entity’s identity and profile are considered based on granular policy
implemented in Element 7. For example:
By combining these values, identity control becomes quite powerful and each
identity should be unique at the moment of authorization (re-assessment will
be discussed in Element 4 with dynamic risk scoring).
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 28
Section 1 Verify
Luckily, most organizations already have the baseline technology in place to begin
this journey in the form of an IdP with the context of an enterprise IAM.
By reviewing the types of users and role definitions within an IdP platform, IT
admins can create an initial sketch of different roles within an organization.
This is not to say that a zero trust identity is solely a value delivered by an IdP. As
Figure 16 outlines, identity should consider multiple values by both asking who the
entity is and also evaluating the profile of the entity. Nevertheless, an IdP platform
should be every enterprise’s first step along the zero trust journey. After all, with
least privilege, nothing happens without validating identity.
Pro Tip:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 29
Section 1 Verify
IdP integrations mean the zero trust solution is not the store of identity, but rather
where validation and verification happen against a set of predefined controls.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 30
Section 1 Verify
This element of the zero trust process is dependent on the functionality of the
IdP, including how identity is determined, managed, organized, and updated.
As such, the level of identity differentiation will be unique to each company and
should commonly be tied to roles as defined by HR.
Further granular identity assessments are possible depending on the tools and
machines in use. However, it’s best for enterprises to begin categorization with
data and risk classification systems unique to each company.
Note: If the control assessment of Identity and Context cannot be met, the
access must default, as outlined in Figure 11, to a Conditional Block policy.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 31
Section 1 Verify
User Identity
The Zero Trust Exchange has deep integrations with the following IdP partners
(as of August 2022):
Zscaler is also able to integrate with other common IdP providers who authenticate
and share authentication values via SAML, including:
• OneLogin
• Google
• Microsoft ADFS
• CA Single Sign-On
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 32
Section 1 Verify
Email_wntynvy-OneLogin Nate_at_wntynvy.com
Figure 18: Example of different identity values taken from a production Zscaler platform.
Zscaler then combines identity data with additional device profile information,
sometimes via APIs from other third-party systems like endpoint detection and
response (EDR) vendors, to understand the holistic identity of the user.
Location Identity
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 33
Section 1 Verify
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 34
Section 1 Verify
Internet
API API
Azure | GCP SaaS
Zero Trust
Exchange
AWS
Factory
DC
Zero trust identity at an IoT/OT and workload level is meant to ensure the
appropriate initiating workload can communicate with a destination workload only
if authorized to do so. Zscaler leverages the following broad workload identities:
Report Card 01
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 36
Section 1 Verify
Element 2:
What is the access context?
Workforce/Third Party
• Sales, Engineering, Support
API 2. What is the access context? User + Device • Contractor, Supplier, B2B customer
Location
1. Who is connecting? • HQ, Branch, Factory, Remote/City
Device
Connection Terminated to • Corporate Managed, BYOD
the Zero Trust Exchange
• PC, Notebook, Mobile, Tablet, etc.
• Testing
• Development
• Camera, Printer
IoT / OT
• Sensors, Actuators
Figure 20:
When access is verified,
what additional
criteria makes up the
access request?
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 37
Section 1 Verify
Identity is initially considered the ability to deliver a “yes” or “no” binary output
based on the initiating entity being authenticated or not. Now we must associate
the details of who is connecting with the context of that connection, which
allows for additional control of least privilege zero trust. This is made possible by
leveraging various identity and profile values at a granular level.
Context in the identity space reveals various insights about the initiator.
Continuing the example from Element 1, an employee may identify as Jane Doe.
This can be validated by the enterprise IdP. Additional context, however, can be
used to further verify their intent, their abilities, and ultimately allow for greater
definition of identity.
To demonstrate this context, this time using a workload, the identity may be as
simple as two RESTful API processes, let’s call them “device-tickle” and
“receive-name.” The context in which these APIs are enabled and employed is
what differentiates them from other API calls and processes. Let’s compare these
two APIs with contextual differences bolded and underlined:
device-tickle: Calls a remote device and uses an HTTP PUT function to tell
the remote device “hello.” Note: This is through json (JavaScript Object
Notation). This could be used to confirm the remote device is still online.
versus:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 38
Section 1 Verify
In these access examples, while both are similar in that they are using the HTTP
protocol to execute their function, there are fundamental differences beyond
simply the initial identity (name). Given one’s ability to prove the variable context,
access should be different.
Zero trust controls must allow an enterprise to set granular rules around the
context in which device-tickle and receive-name can communicate and access
services. This level of contextual granularity can be expanded to many aspects
within an enterprise and are not solely related to workloads. The contextual values
need to be considered for each enterprise’s requirements and included in the
Verification of Identity.
In the same way that your Netflix login gives you access to Netflix, it is
the things about you–age, location, interest, viewing history, etc.–that
allows Netflix to recommend shows that will most interest you.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 39
Section 1 Verify
A defined location would be an enterprise office space where users are more
trusted than on the open internet. Defined locations may have specific policies
applied to them, e.g., user office networks can access the internet, but office
server networks cannot. These sorts of network divisions were historically
managed by VLANs.
Geographic considerations
Defining geographic controls is important not only for security but also for
functionality. From a security perspective, user access from specific sanctioned
countries should be controlled. From a functional perspective, users should be able
to access global resources like google.com in their native language, for instance.
Geographic controls can also be used to stop the “impossible traveler” who
accesses one service from their device in Sydney followed by an additional service
from a location in São Paulo in quick succession.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 40
Section 1 Verify
Timing bands
Device type
Access to services should vary depending on the device requesting the access. For
users, the following context should ultimately define various levels of access:
Similarly, when defining IoT/OT and workload access context, the requesting
device plays a larger role in determining access context:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 41
Section 1 Verify
Zscaler allows for a wide set of contextual validation integrations. These should
be looked at in combination with other tests to deliver a contextual outcome
acceptable to the enterprise.
Managed Devices
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 42
Section 1 Verify
Unmanaged Devices
These are devices that have no relationship to the organization and include
BYOD, third-party, or contractor devices. The ability to assess the status of
these devices can be limited, making them immediately less trustworthy
than managed devices. But there is a way to differentiate various unmanaged
devices, e.g., a contractor working for the organization versus an employee’s
personal device. Access for unmanaged devices requires different access
methods depending on an organization’s risk tolerance.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 43
Section 1 Verify
It’s possible to leverage the Zscaler Client Connector to ensure device validation can
differentiate device trust compared to unmanaged devices. That value can then be
used to allocate different levels of access. The following are examples of validated
users using various devices:
Data
SaaS IaaS/PaaS Center
Factory
Figure 21: Both unmanaged and managed devices are protected by the Zero Trust Exchange.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 44
Section 1 Verify
Zscaler also collects various sets of data to identify workloads. These are broken
down into sub-functional groups based on the needs of the enterprise. The Zero
Trust Exchange has a unique role in the implementation of control, in that it sits
between the initiator and destination.
Ultimately, the goal is to ensure that the appropriate initiating workload can
communicate with a destination workload only if authorized to do so. Zscaler
assesses the context of workload access based on attributes that include site,
location, cloud, and environment level.
For connections between sites, data centers, clouds, the internet, etc., Zscaler is
able to consume network criteria, network segments, and IP information to deliver
a zero trust policy of access between workloads in various sites.
Connections between workloads within a location, like a VPC, can follow similar
network paths and be greatly enhanced through process identity and context
validation. This can be achieved and controlled through the deployment of agent
software on the various workload systems.
This ability of the Zero Trust Exchange to differentiate access down to a per-
request basis of initiator to destination, regardless of the underlying network,
allows Zscaler to deliver granular and uniform access controls to workloads.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 45
Section 1 Verify
Factory
X
Zero Trust
Exchange
Secure Remote
Operations
All Protocols (RDP/SSH)
Figure 22: Zero trust for the IoT/OT systems across common access requirements.
Figure 22
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 46
Section 1 Verify
Progress Report 2: User context has now been added to the access flow.
Report Card 02
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 47
Section 1 Verify
Element 3:
Where is the connection going?
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 48
Section 1 Verify
As discussed, the first element of the Verify process concludes with the initial
identity assessment. The next element requires understanding the resource being
requested: the application. The app needs to be identified, yes, but its function,
location, known risks or issues, and relation to the identity of the access requester
must also be evaluated. The app’s condition must be understood at a high level.
Examples of important considerations include whether the app is known or not,
and whether the app is publicly available on the internet.
Traditional network controls force all traffic to pass through the same
set of controls, regardless of the application type, location, function, etc.
Firewalls are famously network-centric and attempt to add application-
layer controls by layering them on top of their network function.
In determining why this is important, one must recall how legacy IT controls are
implemented statically based on network controls–for example, using IP addresses
and TCP port values to identify the service. This is not only limiting and subject to
misconfigurations, but also inefficient to set up and maintain.
Take two common apps you may need to access: one internal (like an ERP
platform) and one external (like YouTube). These apps have substantial differences
in function, form, location, etc.
With a firewall, both apps are treated the same. Controls are applied universally
until the path is selected, a decision that typically happens post-control and is
reliant on the network (see Figure 24).
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 49
Section 1 Verify
Internet
Service
Firewall ERP
Network paths,
enforced by firewall
Figure 24:
Firewall-based
Client device
anchored on protection, limited by
a network network layer controls.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 50
Section 1 Verify
Conversely, deploying a zero trust solution that is natively based on layer 4-7
proxies allows for inline integration and understanding of identity in relation
to users’ access requests. This means that, when access is requested with a
true proxy-based zero trust solution, the control focuses on the identity and
conditions of the initiator (all the values outlined in Element 1) plus the context of
the destination application, rather than solely an IP address. User-to-application
segmentation can therefore be achieved not based on cumbersome network
controls but rather by identity-aware policies.
This allows a zero trust solution to assess end-to-end (not solely network-based)
context and apply controls for more granular categorization and access control.
With a zero trust solution, applications are evaluated individually. The ERP app is
recognized as an internal app that should be utilized by few users, while YouTube is
recognized as an external app available to anyone. Infrastructure, locations, and IP
addresses related to YouTube are easily identifiable and should be actively updated
within application context.
Internet
ERP
Service
Identity
Internet Private
Control Control
Figure 25:
Zero trust app access
policy controls are applied
regardless of the client Client Device,
anywhere
application location.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 51
Section 1 Verify
Foundationally, all services within a zero trust solution must not be trusted. Trust
considerations have substantially shifted due to the dynamic nature of content
and applications accessed. Least-privileged access in zero trust delivers multiple
benefits to enterprises:
Pro Tip:
2. For all other traffic, obtain visibility over access, thus giving visibility and
an inventory of apps with a discovery policy.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 52
Section 1 Verify
Employee: Alice
Dept: Audit and Control
Figure 26: Machine learning radically simplifies app segmentation in large, flat networks.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 53
Figure 26
Section 1 Verify
Connectivity is not the goal of app determination. Rather, it’s the implementation
of rules to decide what conditions will be considered within the Control and
Enforce phases.
• Internal apps are those hosted by the enterprise in their data center or in
an IaaS/PaaS environment that have an inbound listener, but are generally
privately hosted behind network layer controls like firewalls and connected
to internal trusted network paths. These apps exist in internal address
spaces, e.g., server1.local, or on a private IP (RFC-1918) space.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 54
Section 1 Verify
These are applications that the zero trust system already knows and can be
classified into one of three categories:
• Known risky: Applications that are documented, reviewed, and are possibly
risky depending on who accesses them, e.g., InfoSec websites
Unknown apps
These are applications that the zero trust system has newly discovered and
has not yet categorized. These apps should be considered untrustworthy
and risky until proven otherwise. This ensures Control and Enforce policies
scrutinize these apps at the highest level.
If unknown apps are external, i.e., consumable on the open internet, the zero
trust solution should be able to quickly assess their risk level. This assessment
concludes with a categorization of the site based on function, such as a video
streaming site versus a sales tool.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 55
Section 1 Verify
Submit to Bypass
Inspection Inspection
Inspect Bypass
Conditions
of Access
Define Critical
Collect Flag as Apps
Categorize
Conditions for Discovered for Private App
Public App Shadow Report
Collect
Conditions for
Private App
Location Internal
External
of App
App
Requested
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 56
Section 1 Verify
• IoT apps generally collect data from IP-enabled things and forward it
to external IoT platforms for analysis.
OT is unique in that the hardware and software are designed to monitor and
control specific physical environments, such as heating a space or slicing
food. Typically, OT controls follow a standardized set of OT security controls
depending on their function (e.g., IEC 62443 or the Purdue Model).
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 57
Section 1 Verify
Internet
Zero Trust
Exchange
Remote
Operations Identity
Workforce/Third-Party Access
Fast, direct access to equipment
While web-based apps are the majority of traffic (over 80%), they are
not the only traffic requiring categorization. Non-web apps might include
categories enterprises map to certain functions, like “All file servers” as
a group that contains all IP addresses, FQDNs, and domain names for all
servers that host file servers running on port 445 (SMB).
Figure 28
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 58
Section 1 Verify
Decoy apps
Policy definitions should include the ability to define alternate destinations for
app access. This allows enterprises to define honeypot-like services that help
identify and mitigate threats posed by compromised users.
Not all applications, segments, or groups are created equal. Each enterprise
must differentiate between app types based on its business and priorities.
This normally involves risk and data classification requirements and/or
enterprise “key assets.” Differentiating these in policy is critical to
subsequently defining access, roles, controls, etc.
Critical apps must be differentiated in policy and access control from less
critical apps, where access is more open. Enterprises must clearly define
and manage these apps. Ideally, this would be based on a classification
system taken from standards like SOC 2, PCI, or similar. Enterprises
should consult internal security risk and compliance teams to align specific
classification requirements.
These destination values, coupled with Element 1 outputs, allow a zero trust
solution to make a definitive policy decision and apply enforcement within
Element 7 in accordance with enterprise requirements.
Note: If the App Policy cannot be met, access must default to a Conditional
Block Policy.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 59
Section 1 Verify
Zero Trust
Exchange
Figure 29: External and internal traffic are split at the source.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 60
Section 1 Verify
The requested application is assessed only after Zscaler has validated the initiator in
Element 1. Zscaler’s assessment involves multiple phases to ensure three key points:
Location Internal
External
of App
Figure 30:
Determination of the App
path and controls based Requested
on traffic type.
Rather than sending all traffic to a distant edge service to determine external and
internal paths, as with typical network-based connections like VPNs, the Zscaler
Client Connector is able to intelligently understand the type of application (external
or internal) and steer it over the correct tunnel to the correct security edge service,
as in the following instances:
• YouTube is an external internet app and must have its controls implemented
at the internet control layer.
• erp.company.local is an internal app and requires not only a different set of
access controls but also separate access paths.
By intelligently breaking off traffic at the client layer, Zscaler delivers two distinct
advantages:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 61
Section 1 Verify
2. Application categorization
Known Unknown
Figure 31:
Process to decide Do we know
if the app has been the app?
seen before.
Once an application request reaches the correct enforcement point, the app’s actual
function and category are evaluated, categorized, and if necessary, updated. This
ensures that, once the Control and Enforce phases process the traffic, the correct
control is applied to the correct access request.
Figure 32:
Application
example
with multiple
associated
addresses
(and services).
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 62
Section 1 Verify
Predefined
Common apps can be prepopulated with data available on the open internet.
This mostly applies to internet-based services.
Manual Definition
Details of applications are set by the client. While internet-based services are
rarely left to customers to define, internal applications are often best defined
by the client, especially when restricted.
Cloud Definition
This includes services consisting of various sets of apps and functions, like
YouTube. Zscaler leverages active learning from traffic across the cloud to
ensure the latest information is included in the application policy.
API-Driven Definitions
Leveraging integration with cloud services, Zscaler actively learns from
platforms, like Microsoft 365, to deliver the latest app segment definitions.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 63
Section 1 Verify
If the application is not known to the Zero Trust Exchange or the customer, it must
be flagged as newly discovered. Zscaler subjects newly discovered apps to various
assessments to understand their function, risk, and other insights. Within Zscaler,
the app is categorized and evaluated in the following manner:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 64
Section 1 Verify
App categorization by group allows for efficiencies in the size and scope of apps to
be taken into account.
The Zscaler Zero Trust Exchange creates and manages apps across various
categories, including:
Visit Zscaler Help for a full list of cloud app categories or URL categories.
Figure 35: The Zero Trust Exchange uses numerous factors to identify a suspicious domain.
Customers can also manually create and modify their own app segments based
on their application classification requirements.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 65
Section 1 Verify
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 66
Section 1 Verify
Decoy apps
An entirely unique type of application exists whereby the Zero Trust Exchange
will identify and direct a compromised user to a decoy cloud. This decoy
cloud will mimic the behavior of an actual internal application while preventing
lateral movement and the loss of sensitive data. By observing behavior of the
compromised user within the sensitive application, further damage is prevented.
Data
Public Cloud Center
Zscaler Deception
Connect attackers to decoys
X
App Protection
Block exploit attempts
App Decoys
Stop lateral movement
SOC
Endpoint Lures
Detect compromised user
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 67
Section 1 Verify
Application segmentation
The creation of access policy rules can seem daunting, especially when moving
from a VPN-based solution where such rules were not needed since users were
granted wide network access. It’s often useful to start the app segmentation
journey with no segmentation at all, and leverage the Zero Trust Exchange by
applying a *.* application policy. While this mimics the level of access provided by
the VPN, it has the benefit of removing the attack surface caused by an externally
exposed VPN concentrator. Using this as a starting point, the enterprise can
go on to create more granular access control policies. Machine learning-based
techniques allow Zscaler to recommend access policies based on the actual traffic
flows. More details on application segmentation can be found in Appendix 1.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 68
Section 1 Verify
Verify where the access is going Verify where the access is going
Internal ERP service on port 23 in clear text Internal File share service on port 445
External new Social Media site on port 443, encrypted External video sharing site on port 443, encrypted
©Report Card 03
2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 69
Section
2
Control
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 70
Connection initiated to an
Enforce app, not a network
Policy, Per-Session
Decision and Enforcement
Section 2 Control 7. Enforce Policy
Monitor Experience
6. Prevent Data Loss
Control
Control 5. Prevent Compromise
Content
Contentand Access
and Access
looking inside to see what’s going on. Element 4 describes how risk is assessed,
while Element 5 and Element 6 discuss how content is inspected for cyberthreats
and possible sensitive data exfiltration.
Internet Internet
3. Reset connection once 3. Establish connection
it’s determined to be bad if good
Figure 10
2. Inspect full content
0101010 Buffer PROXY File extraction (PDF, RAR)
2. Inspect a limited buffer
for effective threat and
data protection
Figure 37:
Comparing pass-
through and proxy Unlike a firewall’s pass-through architecture, a proxy architecture is designed for
architectures. proper content inspection for effective cyberthreat and data loss protection
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 71
Section 2 Control
Element 4:
Assess Risk (adaptive control)
Workload (API)
• Attack Surface
Workload
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 72
Section 2 Control
In life, we’re all judged by the outcome of our last performance. The same goes
for zero trust. The previous elements are only as good as the latest assessment.
The solution must account for an enterprise’s tolerance for risk via a dynamic
risk score.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 73
Section 2 Control
Pro Tip:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 74
Section 2 Control
Just as behaviors vary among user identities, workloads must also be evaluated
relative to their known and comparatively static activity; an SQL client should
talk to an SQL server, but rarely if ever should it communicate with an
unrecognized server.
Third-party solutions can provide additional insight into user and workload
risk assessments. Those garnered from EDR, SIEM, or SOAR services may add
context for improved determinations.
Note: If the control assessment of Risk Score cannot be met, the access should
default, as outlined in Figure 11, to a Conditional Block policy.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 75
Section 2 Control
These values are dynamically identified and delivered to the policy enforcement
stage discussed in Element 7, allowing enterprises to regulate access based on the
latest, dynamically collected scores.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 76
Section 2 Control
Figure 40: An example user risk score measures against factors including
overall risk and comparison with similar employees and peers.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 77
Section 2 Control
The Zero Trust Exchange actively collects information to support risk assessment
scores from the individual customer’s set of configurations, uses, and insights–
for example, looking both at the number of malicious callbacks from a client
during a time frame along with global inputs from the Zscaler cloud.
An example outcome of a user risk score analysis that would result in a particularly
high risk score looks like this:
Yesterday
Workloads generally have a limited set of risk identifiers for defining how one
differs from another. Thus, they should be considered based on the location from
which they attempt to initiate a session. Defined as such, workload risk scores are
a function of a location’s sensitivity combined with tendency toward anomalous
behavior. For example, a protected file share workload should not have access to
Netflix, with any deviation being cause for a change in the site’s risk evaluation.
Given the lack of unifying identity solutions for IoT/OT devices and the fact that
identity is static, the riskiness of any “thing” is calculated by Zscaler using device
traffic flow. As such, traffic flow is broken into two categories, outlined in Element
5 and Element 6.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 78
Section 2 Control
When delivering services across many IaaS, PaaS, and SaaS offerings in addition
to leveraging microservices and serverless architectures, siloed on-premises
security solutions can’t scale fast enough to secure mission-critical cloud
applications anymore.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 79
Section 2 Control
Verify where the access is going Verify where the access is going
Internal ERP service on port 23 in clear text Internal File share service on port 445
External new Social Media site on port 443, encrypted External video sharing site on port 443, encrypted
Progress Report 4: The calculation of risk for Jane is quite different than for John.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 80
Report Card 04
Section 2 Control
Element 5:
Prevent Compromise
Figure 42:
The Zero Trust Third-Party API Integrations
Exchange provides Threat Intelligence Endpoints: CrowdStrike,
inline inspection to 40+ threat feeds Microsoft, etc.
prevent compromise.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 81
Section 2 Control
Note: For a live view of the volume of encrypted traffic at any one time across
the Zscaler cloud, see the ThreatLabz Encrypted Traffic Dashboard.
Encrypting HTTP internet traffic has become a trivially simple process. This has
led to a greater degree of protection for consumers, ensuring their information
and personal details are not exposed to unscrupulous snoops on the internet.
Services like LetsEncrypt allow anyone to obtain trusted public key certificates,
driving an incredible rise in encrypted traffic.
The bad guys have also caught on and now deliver their attacks via encrypted
channels like HTTPS. In the 2022 Zscaler Ransomware Report, ransomware as a
service (RaaS) was leveraged by eight of the top 11 ransomware families. Each of
these RaaS services uses SSL/TLS encryption to protect its actors as well as for
delivering ransomware payloads.
Identifying and protecting against such ransomware attacks can therefore only be
achieved by inspecting SSL/TLS traffic. Without this inspection, it is not possible
to protect against initial attacks against enterprises or to stop the exfiltration
of data (see Element 4). Nor is it possible to have visibility into command and
control (C2) traffic as infected devices speak back to malicious command centers
since C2 traffic is mainly encrypted via SSL/TLS. Identifying C2 traffic greatly
reduces this threat.
10101010101010101010101010101010101010101010101010101010101010101010101010
SSL/TLS SSL/TLS
Figure 43: SSL/TLS communications are encrypted and undecipherable without decryption.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 82
Section 2 Control
Compromise prevention must take into account all threats targeting enterprises,
which fall into two categories:
Inline Threats
Malicious actors, code, plugins, and more also use SSL/TLS encryption
as a means of transport. SSL/TLS public key encryption is the global
standard for data protection of secure web transactions for the majority
of the internet. Each data packet is turned into a code string decipherable
only between an initiator and a destination service, regardless of the
network.
This helps users protect sensitive information like passwords and credit
card details, and prevents untrusted parties from observing or making
sense of private communications. This protects against eavesdropping
and data tampering by untrustworthy parties, but also gives threat actors
the ability to hide their attacks.
Out-of-Band Threats
It’s important to also address the risks that are stored within SaaS, PaaS,
IaaS, or other cloud solutions. An out-of-band assessment, as part of a
unified threat management solution, provides enterprises with a full view
of inbound threat paths and actively identifies threats before malware is
downloaded, shared, or launched.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 83
Section 2 Control
The ability to view traffic and cloud app use is critical for ensuring malicious
content like botnets and malware isn’t hidden in encrypted traffic. With
the bulk of internet-bound traffic being encrypted, allowing this traffic to
pass through unexamined or services to be used without inspection is risky.
Inspection of both external and internal application access is critical since
both traffic flows may be encrypted.
100%
90%
80%
70%
60%
50%
40%
30%
20%
10%
0%
Jan 01, Jan 01, Jan 01, Jan 01, Jan 01, Jan 01, Jan 01,
2016 2017 2018 2019 2020 2021 2022
Figure 44: Growing rates of encryption used on the Chrome web browser.
Source: Google Transparency Report
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 84
Section 2 Control
Pro Tip:
Inspection in many geographies may take time and effort to find the right
balance of privacy appropriate for workers’ councils. Identifying the correct
balance of risk reduction and privacy is not static and should be incremental,
starting with less controversial geographies and traffic types.
Enterprises must consider the value of the visibility and insight garnered by
inspecting traffic. This value must be assessed, however, in relation to privacy
controls and restrictions for end users. Organizations must establish a balance
between their right to be protected from threats and a user’s right to privacy.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 85
Section 2 Control
Inline considerations
Opens Browser
Sends HTTPS Request
User
Figure 45: Process by which a client negotiates a secure session with a destination server.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 86
Section 2 Control
Therefore, true zero trust vendors must provide full inline SSL/TLS inspection
capabilities. The most effective implementation of SSL/TLS inspection is
through a native, proxy-based solution that is transparent to the end user.
Bolting on a function to existing next-generation firewalls (NGFWs), which
have inherent challenges scaling, is not recommended.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 87
Section 2 Control
Method
of SSL Next-Gen Firewall Proxy
Inspection
Out-of-band considerations
Leveraging the same policy controls for inline inspection, a zero trust platform
should govern data at rest within cloud applications, preventing dangerous file
sharing and even file oversharing. When considered holistically, out-of-band
controls complement previously outlined inline controls so cloud apps cannot be
used as an attack vector.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 88
Section 2 Control
Zscaler’s comprehensive set of inline protection with the Zero Trust Exchange
provides a unique ability to understand the threats an enterprise faces. With these
insights, Zscaler is able to offer a global dashboard of threats, including all attacks
Zscaler sees across its clouds.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 89
Section 2 Control
Figure 47: Zscaler dashboards showing Cloud Activity and threats blocked.1
Source: https://www.zscaler.com/threatlabz/cloud-activity-dashboard
1
Source: https://www.zscaler.com/threatlabz/encrypted-traffic-dashboard
2
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 90
Section 2 Control
Pro Tip:
Before After
General General
Figure 49: SSL/TLS inspection is critical to visibility for any security organization.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 91
Section 2 Control
The Zero Trust Exchange was built on the zero trust premise of ensuring
only the correct controls are applied to the correct services. Ensuring these
paths are accurate means effective connections and sessions for users, but
more importantly, conserves resources. Enterprises must consider that not
all traffic types can be, or should be, inspected. These must be addressed by
each company under their specific use cases. Why send a video conference
stream of real-time voice/video traffic via UDP (Zoom, Teams, etc.) through an
inspection path, for example? There’s nothing malicious within the video stream
itself, so the goal should be to inspect the voice and video control plane traffic
while bypassing real-time traffic without inspection.
Zscaler has deployed its inline inspection controls for two different sets of
destination workloads:
External Internal
applications applications
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 92
Section 2 Control
External applications
Figure 50: How Zscaler provides inline inspection for web applications.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 93
Section 2 Control
Cloud Firewall
Cloud firewalls extend protection to all ports and protocols for industry-
leading protection by replacing edge and branch firewalls with a cloud-
native platform.
Cloud Sandbox
Advanced AI/ML-based cloud sandboxes stop patient-zero attacks with
instant verdicts for common file types, automating the quarantine of
high-risk, unknown threats.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 94
Section 2 Control
The ability to inspect any internet-bound content has knock-on benefits, such as
This inspection ability allows the Zero Trust Exchange to inspect the SSL/TLS
traffic on the wire, but even as the Zero Trust Exchange terminates the
connections, it retains full visibility over other certificate parameters not typically
visible to passive SSL inspection devices. This makes the Zero Trust Exchange:
Cloud scalable
Zscaler’s custom TCP and SSL/TLS stack handles encrypted traffic on a
global scale. Its architectural advantage ensures that SSL/TLS inspection
becomes a non-issue for enterprises. Inspecting traffic, including
encrypted traffic, in real time allows the Zero Trust Exchange to identify
attacks while keeping an eye out for traffic that may include corporate
secrets (see Element 4).
Simple
Zscaler’s “security-as-a-service” architecture operates seamlessly,
without imposing new hardware planning requirements or costly
upgrades to accommodate future TLS versions.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 95
Section 2 Control
Internal applications
When an initiator requests a service within the limits of your own security
boundaries–VPCs or on-premises architecture, for instance–the threat model
shifts. HTTP-based services must be inspected even after a valid user and
acceptable risk score have been verified.
Inline traffic
inspection and Data Center Factory IaaS/PaaS
data loss
prevention for
X
HTTPS/TLS
Zero Trust
Exchange
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 96
Section 2 Control
Zscaler is able to protect against the most prevalent web-borne attacks with inline
inspection and prevention capabilities for these internal services. These capabilities
run within each security boundary of an enterprise app, such that inspection for
attacks on Segment A may differ from the inspection controls of Segment B, thus
delivering granular control of functions based on the segment and access control
needed.
The Zero Trust Exchange is a complete data protection platform built for both
inline and API-based (out-of-band) inspection. It provides detailed visibility of
data at rest and in motion to help teams make better data protection decisions and
quickly identify malicious content that may be stored in cloud repositories. Further
discussion of data protection is provided in Element 6.
Inline protection acts as the building block for establishing which data should travel
versus which shouldn’t. Out-of-bound controls allow enterprises to apply controls
to counter any threats against data at rest.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 97
Section 2 Control
Verify where the access is going Verify where the access is going
Internal ERP service on port 23 in clear text Internal File share service on port 445
External new Social Media site on port 443, encrypted External video sharing site on port 443, encrypted
Progress Report 5: Inspection of traffic reveals and blocks malicious content for Jane.
©Report Card 05
2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 98
An Overview of Zero Trust
Element 6:
Prevent Data Loss
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 99
Section 2 Control
As part of the Control phase, enterprises must consider what data leaves
the organization. SSL/TLS inspection at scale ensures that attacks against an
enterprise are stopped, and this same inspection can also be applied for data
egress controls.
The ability to inspect traffic destined for the internet, SaaS, or internal
applications is important for identifying and preventing the loss of sensitive
data. The use cases are obvious for the internet, where both inline decryption
and inspection and out-of-band API scanning must ensure that sensitive
data is not leaked or exfiltrated to unauthorized cloud services. However,
the same protections should be extended to internal application access.
This capability applies to both managed and unmanaged devices and is also
important when considering IoT/OT devices and workload communications.
However, concerns are not limited solely to users. As the 2020 SolarWinds
breach showed, enterprises not monitoring server data sent outbound to the
open internet are unlikely to be able to stop the exfiltration of sensitive data,
e.g., via a supply chain attack.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 100
Section 2 Control
Healthcare 643%
Restaurants, Bars & Food Services 460%
Mining 229%
Education 225%
Media 200%
Manufacturing 190%
Basic Materials and Chemicals 177%
Construction 161%
Financial Services 130%
Services 109%
Food, Beverage & Tobacco 100%
Insurance 94%
Real Estate 93%
Retail & Wholesale 71%
Telecommunications 69%
Oil & Gas 63%
High Tech 58%
Governmnent 37%
Other 28%
Nonprofit Organizations 16%
Advertising 7%
Transportation 0%
Consumer Services -5%
Utilities -25%
Aerospace & Defense -33%
Energy -50%
Arts, Entertainment & Recreation -70%
Household & Personal Products -83%
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 101
Section 2 Control
Misconfiguration leads
Compliance Issues to cloud data breach
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 102
Section 2 Control
Protection starts with blocking access to unauthorized users. This is the simplest
protection policy. Consider two examples:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 103
Section 2 Control
Enterprise resource protection must also include the ability to view resources
that may be out-of-band, which entails scanning the APIs of SaaS providers to
protect data at rest, or inline, which requires the scanning of data in motion.
Pro Tip:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 104
Section 2 Control
Note: Any file store that leverages file-level encryption like AES would be visible
to an out-of-band API as an encrypted file only. There is no visibility within the
contents of the file.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 105
Section 2 Control
Note: If the control assessment of Prevent Data Loss cannot be met, the access
should default, as outlined in Figure 11, to a Conditional Block policy.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 106
Section 2 Control
The Zero Trust Exchange is a complete data protection platform built for both
inline and API (out-of-band) inspection. It provides granular visibility of data at
rest and in motion to help teams make better data protection decisions and quickly
identify malicious content that may be stored in cloud repositories or unauthorized
uses of shadow IT. Essentially, inline data protection acts as the building block for
establishing the paths data should travel versus the ones it shouldn’t.
With the Zero Trust Exchange in place to control what data should leave your
network and what sanctioned apps need to be secured, enterprises can start
considering out-of-band CASB for protecting data at rest. This prevents
sensitive information from being shared via open internet links or handed over to
unauthorized groups. Out-of-band controls can scan cloud apps for dangerous
malware and leverage AI/ML-enabled sandboxing to quickly identify files that
shouldn’t be mixed in with sensitive data.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 107
Section 2 Control
User and Entity Behavior Analytics (UEBA) (which also contribute to risk scores
discussed in Element 5)
• AI- and ML-based analytics
• Threshold-based user anomalies
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 108
Section 2 Control
Public
Internet SaaS Cloud
TOP SECRET
TOP SECRET
Pixels
Figure 56:
The Zero Trust
Public Exchange provides
Cloud Data Center secure user access
to data.
Inline LP policies for users, servers, VDI controls for web apps to
workloads, loT and OT Systems secure BYOD and B2B access
Open S3 X AWS
bucket
Inline Out-of-Band
CASB CASB (ASP) Azure APIs GCP
Figure 56
Prevent Box
X Link Share
Figure 57:
The Zero Trust
Exchange also
Discover sensitive data and secures data in
prevent oversharing the public cloud.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 109
Section 2 Control
Zscaler can also provide secure, controlled access for unmanaged devices (BYOD)
requesting information. But what happens to the information once it’s downloaded
to an unmanaged device? Organizations must control how this data is accessed
and where it resides. Thus, Zscaler’s Browser Isolation enables access to private
data without allowing the data to persist on the device by streaming pixels rather
than allowing unfettered browser access.
Beyond inspection of traffic and content, Browser Isolation can deliver a safe gap
between users and the internet and SaaS-based web apps that they connect to. By
rendering app content as a stream of images, Browser Isolation allows enterprises
to deliver access to services to valid users without ever allowing direct connections
to the app itself. This eliminates the possibility of data leakage or threat delivery.
Zscaler delivers isolation for both external and internal services as outlined in
Element 7 covering policy enforcement.
This comprehensive set of inline protection controls gives the Zero Trust Exchange
the unique ability to provide views of who is accessing what on the internet. Given
this capability, Zscaler is able to offer reports including:
Distribution
Microsoft 365
10.3 Trillion
Transaction
Microsoft Teams
Figure 58:
Zscaler Cloud
Application Hotmail DoubleClick
Dashboard.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 110
Section 2 Control
Verify where the access is going Verify where the access is going
Internal ERP service on port 23 in clear text Internal File share service on port 445
External new Social Media site on port 443, encrypted External video sharing site on port 443, encrypted
©Report Card 06
2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 111
Section 3 Enforce Policy
Section
3
Enforce
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 112
Section 3 Enforce
External Internal
Data
SaaS Internet Center Factory IaaS/PaaS
Inside-out Connections
Connection initiated to an
Enforce
Enforce app, not a network
Policy, Per-Session
Decision and Enforcement 7. Enforce Policy
Policy, Per-Session
Monitor Experience
Decision and Enforcement 6. Prevent Data Loss
Figure 10
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 113
An Overview of Zero Trust
Element 7:
Enforce Policy
Policy Actions
Conditional Block
Access over any
network Quarantine: Ensure access is limited
and protected
Deceive: Direct attacker to a decoy
application
User + Device | Thing | Workload
Figure 59:
Access policy is enforced based
on a number of Conditional Allow
or Conditional Block actions.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 114
Section 3 Enforce
Following the Verify and Control stages, and armed with an understanding of
dynamic risk assessments, we arrive at the point of enforcement. Enforcement
is not centralized on a network of dedicated equipment, as is often the case with
traditional security solutions. Authorization decisions made in Element 1 and the
assessments in Element 2 influence enforcement in our current stage.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 115
Section 3 Enforce
Policy enforcement must take into consideration all previously validated qualities:
1. Identity
2. Context
3. Application destination
4. Dynamic risk
5. Malicious content
6. Data loss
Conditional Allow
Access is granted to the requested application not as a blind allow-and-
connect, but with the ability to deliver additional controls, such as isolation,
inspection, and warnings.
Conditional Block
If conditions of an access request are flagged in Elements 1-6, access is
blocked. Block controls can be called at any time during Elements 1-6 if an
initiator fails one of the tests. For example, access would be blocked if an
authorized user and device are validated, but then malware is downloaded.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 116
Section 3 Enforce
Anyone on that network can see all other nodes. A control, such as a firewall,
can minimize some of the attack surface, but if access is needed to a service,
there still needs to be an open path through the controls. This is similar to
Figure 60 below where standing on a street allows an onlooker to see each
house, approach it, and test if their key works in the door.
Figure 60: Traditional network controls preserve visibility so anyone can see all of the houses and doors.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 117
Section 3 Enforce
The Zero Trust Exchange enforcement policy allows for various controls to be
enforced based on the following formula:
Who is Identity
What is the Where is the Assess Risk Prevent Prevent Data
connecting and Device
access context
App Policy
connection going + (adaptive control) Compromise Loss Extend=the network
Enforce Policy
to IaaS/PaaS
Verify Control Enforce
Identity and Context Content and Access Policy, Per-Session Decision
and Enforcement
Figure 61: The valid inputs from Elements 1-6 allow for accurate and granular policy to be enforced.
Enforcement within the Zero Trust Exchange is not simply limited to the twothe network
Extend
options of “conditional allow” or “conditional block.” Its controls are at to remote workers
the
application layer, not at the network layer as with legacy network control solutions.
The Zero Trust Exchange is implemented as a proxy for all applications and thus
allows for policy control at a very granular level.
Extend the network
Figure 62: Ensuring users can access what they need and nothing more is key to zero trust.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 118
Section 3 Enforce
The Zero Trust Exchange provides numerous Conditional Allow and Conditional
Block outcomes:
Conditional Allow
Allow: If all elements are answered, then the Zero Trust Exchange will
allow traffic to pass.
Isolate: This creates a safe gap between users and the web, rendering
content as a stream of pixels to eliminate data leakage and the delivery
of active threats.
Quarantine and Allow: This result uses cloud sandbox and AI/ML to
identify potentially harmful content, which is then “detonated” in a safe
environment. If benign, the connection is granted.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 119
Section 3 Enforce
Conditional Block
Block: If the conditions of your access requests do not pass the evaluations
of Elements 1-6, then the Zero Trust Exchange will block the session.
Quarantine and Block: This uses cloud sandbox and AI/ML to identify
potentially harmful content, which is then “detonated” in a safe environment.
If dangerous, the connection is blocked.
The Zscaler Zero Trust Exchange allows for multiple enforcement controls to be
applied in policy and not simply make a binary decision of allow or block. For
example, if users are connecting to an external portal that has a source IP trust
requirement, a Zscaler policy could be built to (1) steer traffic from an egress IP
address, (2) prioritize traffic, and (3) isolate the session in a web browser.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 120
Section 3 Enforce
External internal
Data
SaaS Internet Center Factory IaaS/PaaS
App Connectors
Inside-out Connection
Conditional Allow
Allow, Prioritize, Isolate,
Steer, Quarantine
Control
Content and Access
Verify
Identity and Context
Figure 63:
Policy enforcement either
“conditional allow” or
“conditional block.”
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 121
Section 3 Enforce
Should access be granted, then the last step for access is the ability to get traffic
to the correct destination application.
Verify where the access is going Verify where the access is going
Internal ERP service on port 23 in clear text Internal File share service on port 445
External new Social Media site on port 443, encrypted External video sharing site on port 443, encrypted
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 122
Connecting
to the
Applications
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 123
Connecting to the Applications
External internal
Data
SaaS Internet Center Factory IaaS/PaaS
App Connectors
Inside-out Connection
Figure 64
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 124
Connecting to the Applications
Take your house or apartment, for example. The locks on your doors are for your
doors only. You can’t use your keys to enter someone else’s house and, conversely,
people can’t use their keys on your locks. Each key is meant to be unique. This idea
of local control has long been utilized within traditional security controls.
Network Layer
If you share a network context, then anyone can “knock on your ports” just like
a person can knock on your door. This is essentially discovering everything on a
shared network because the controls are on the network.
It is this knocking process that allows the curious or worse, the malicious, to
discover the services, hosts, names, domains, etc., of your enterprise network.
In the houses and streets example, you put locks on your doors (passwords) and
put up multiple physical (network) controls like fences, gates, and hedges (firewalls,
ACLs, etc.) around your houses or buildings to protect them. You also replace those
fences once they get too old. Sure, this makes it harder for bad people to get in,
but it still means people can see that a property exists.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 125
Connecting to the Applications
Networks are relevant in delivering zero trust application traffic, but they are not
the mechanisms where control is enforced. Zero trust controls are not network
focused, they are applied regardless of the location of the initiator, or the workload
that is being accessed.
This means it doesn’t matter where services are: the controls are applied uniformly.
Controls should be independent of the network and be defined for application
access. The network is merely a means of transport, thus controls must be applied
“on top.”
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 126
Connecting to the Applications
External
SaaS Internet
Secure External
App Access User + Device | IoT/OT | Workload
Figure 67: For external apps, connections pass directly from the
Zero Trust Exchange to the destination after policy is enforced.
Note: The destination application path can be selected, or steered, using the
Zscaler Internet Access Policy, allowing customers to determine where their
traffic will egress to the internet. This helps customers address topics like SourceIP
anchoring challenges where internet services only work with geo-controlled
IP sources.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 127
Connecting to the Applications
Internal applications requiring privacy and stronger protection are slightly more
complicated; the Zero Trust Exchange leverages App Connectors, which sit
adjacent to the application destination. These App Connectors provide the
outbound-only connection from the app environment to the broker function
within the appropriate Zero Trust Exchange Service Edge.
Internal External
Data
Center Factory IaaS / PaaS SaaS Internet
Inside-out
Connections
Zero Trust
Exchange
App access is initiated
from App Connectors, via
a per-session encrypted
tunnel (TLS/DTLS)
Access over any network
Secure External
App Access
Secure Internal
App Access User + Device | IoT/OT | Workload
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 128
Connecting to the Applications
The Zero Trust Exchange Service Edge connection, while generally public and
accessible to any authorized entity from the internet, can also be run locally within
individual customer locations for seamless deployment of the zero trust controls.
Data Center
App
Connector
MPLS
Branch/HQ/
Office
On-premises workforce
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 129
Connecting to the Applications
In the situation where the policy engine defines Browser Isolation as a Conditional
Allow path, the Zero Trust Exchange will not allow an initiator to access HTTP-
based applications directly. Rather, these isolated access requests will have the
workload rendered for the user within the Zero Trust Exchange by streaming
pixels. The backend connection, however, remains the same:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 130
Connecting to the Applications
This strategy is often used during the early discovery phase of a zero trust
deployment. Isolation across multiple sites, applications, and infrastructure
enables enterprise connectivity and provides insight into which applications
are being consumed, even if not as granularly defined as typically desired.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 131
Connecting to the Applications
The Zero Trust Exchange consists of three separate planes (control, enforcement,
and logging) that deliver functions without relying on specific networks. The Zero
Trust Exchange control and enforcement planes are independent of network paths
and built to be multi-homed and highly available, so each can run independently
of the other.
• The control plane is where policy definition and admin are enabled.
• The enforcement plane is where Zscaler enforces policy and is globally
distributed to ensure customers receive effective enforcement access.
This policy enforcement plane can be extended to internal and on-premises
locations and is not limited to remote access use cases.
• The logging plane is where configuration takes place and logs are securely
streamed to a SIEM/SOAR.
Note: Zscaler visualizes all policy enforcement actions in the Global Enforcement
Dashboard.
The control and enforcement planes are independent of the network, but enable
any network to operate as a path for access. For example, a network control plane
builds and maintains a routing table, whereas the enforcement plane forwards
the packets.
Control Plane
Policy Definition and Administration
Identity
Nanolog
Streaming
SIEM
Logging Plane
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 132
Connecting to the Applications
By not locking the initiator or the destination to a network, either can live anywhere
and still be accessible. This is how the Zero Trust Exchange delivers:
• Advanced protection – Removes the need for exposed listeners for protection.
Instead, all communications are built on outbound paths, including
• outbound from the end user to the Zero Trust Exchange;
• outbound from the Zero Trust Exchange to the internet; and
• outbound from private app environments to the Zero Trust Exchange.
Therefore, users are given access not to networks, but to applications. This
access is granted on a per-authorized-session basis so that, before access
is granted in this policy phase, all earlier criteria (outlined in Elements 1-6) are
verified. If an initiator does not meet the criteria required by policy, they
cannot get access, and–for private apps–cannot even see that the
requested application exists.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 133
Connecting to the Applications
CONNECT
X
Verify where the access is going Verify where the access is going
Internal ERP service on port 23 in clear text Internal File share service on port 445
External new Social Media site on port 443, encrypted External video sharing site on port 443, encrypted
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 135
A Fast, Reliable, and Easy-to-Operate Zero Trust Architecture
For zero trust architecture to be built properly, the focus must not solely be on
security. It must be built in such a way that the user experience is fast and reliable,
deployment is as simple as possible, and ongoing operations are streamlined and
outage-free. Implementing a zero trust architecture that degrades user experience
and is difficult to operate is a recipe for disaster. It will create excuses for affected
users to find alternatives, increase technical debt, and impact employee productivity.
To ensure easy operation, speed, and reliability, there are various technical elements
to consider when designing a zero trust architecture. A common starting point is
agent technology. As many endpoints are already overloaded with security software,
zero trust architecture should consider deployment options that can consolidate and
remove overlapping agents. As discussed previously, Zscaler employs a single agent,
the Client Connector, to enable its zero trust architecture. This same agent forwards
traffic to the Zero Trust Exchange for external app protection (data loss and cyber
threat protection) as well as brokers a private connection for internal apps, and also
provides digital experience monitoring capabilities.
Additionally, the control of this agent technology, which will live on every
employee’s endpoint device, must be centralized and allow for the ability to push
policy changes and updates easily. The Zscaler Client Connector Portal is built with
this centralized control in mind. All bypass policies and forwarding profiles can be
managed from here.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 136
A Fast, Reliable, and Easy-to-Operate Zero Trust Architecture
While user experience is closely tied to the endpoint agent, the zero trust
provider’s cloud infrastructure is, not surprisingly, critical for providing a fast and
reliable service. Zscaler operates the world’s largest security cloud, with over 150
data centers around the world handling approximately 250 billion transactions
per day, blocking over 7 billion security violations per day, and experiencing over
200 thousand unique security updates per day (as of August 2022). This cloud is
operated with a 99.999% SLA and has direct peering at global internet exchanges
to provide sub-millisecond connections to application providers such as Microsoft.
Oslo
Stockholm
Copenhagen
Amsterdam
Manchester Warsaw
Vancouver Toronto London Brussels
Seattle Chicago Montreal Rouen Frankfurt
San Francisco Paris Zurich Munich Beijing
New York Madrid Seoul
Denver Vienna Tianjin
Washington, DC Milan Tokyo
Los Angeles Dallas Atlanta Osaka
Tel Aviv Shanghai
Nuevo Laredo
Miami Qatar New Delhi
UAE Taipei
Saudi Arabia Hong Kong
Mumbai
Chennai
Kuala Lumpur
Lagos Singapore
São Paulo
Sydney
Melbourne
Auckland
Peering:
Peering in internet exchanges https://www.peeringdb.com
and Microsoft 365 DCs
High
Authority
Figure 72: The Zero Trust Exchange is served from 150 service edges
around the world and handles over 250 billion transactions per day (as of August 2022).
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 137
A Fast, Reliable, and Easy-to-Operate Zero Trust Architecture
As part of the security cloud’s global presence, consider the cloud’s ability to
inspect traffic at scale. To maintain minimal latency for inspection of each packet
bound for internet and SaaS apps, Zscaler employs a single-pass architecture
where the packet is placed into memory once and the inspection services, each
with dedicated CPU resources, are able to perform their scans simultaneously.
This avoids the legacy service chaining of these inspections across serialized
physical or virtual applications that incur a processing penalty at each hop and run
the risk of excess latency imposed on each packet.
Zscaler applies these architectural advantages to newer standards like TLS 1.3,
where a true proxy architecture has the advantage of being inline with independent
connections to the client and server. Since this allows for the entire object to be
reassembled and scanned, advanced threat protection, DLP, and sandboxing can
be applied.
Most users will connect to the SSE via a vendor’s public service edge. These are
full-featured, secure internet gateways and private-application access brokers that
provide integrated security. However, situations may arise where the public service
edge may not meet requirements, and therefore Zscaler offers private service edge
options that are hosted in your own infrastructure. This option extends the public
service edge architecture and capabilities to an organization’s premises or internal
locations and utilizes the same centrally controlled policy as the public service
edges.
For secure access to the internet, private service edges can be installed in an
organization’s data center and are dedicated to its traffic but are managed
and maintained by Zscaler with a near-zero touch from the organization. This
deployment mode typically benefits organizations that have certain geopolitical
requirements or use applications that require that organization’s IP address as the
source IP address.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 138
A Fast, Reliable, and Easy-to-Operate Zero Trust Architecture
For internal application access, the private service edge provides similar
management of connections between the user and application and applies the
same policies as the public service edge, with the service hosted either onsite
or in the public cloud but again managed by the SSE vendor. This deployment
model allows zero trust within the four walls, which is useful to reduce application
latency when an app and user are in the same location (and going to the public
service edge would add unnecessary transit). This option also provides a layer of
survivability if a connection to the internet is lost. Zscaler distributes images for
deployment in enterprise data centers and local private cloud environments.
Both for the public and private service edge infrastructure, the same Zero Trust
Exchange provides protection for user-to-app, workload-to-workload (hybrid
cloud), workload-to-internet, remote user-to-IoT/OT, and IoT/OT-to-cloud
connections.
To ensure optimal performance, the Zero Trust Exchange has its own set of service
edges for policy enforcement and does not rely on the content delivery network
(CDN) model of connectivity edges from a larger, cloud-based network solely
to route or “onramp” your traffic to the central enforcement infrastructure. Such
schemes are antithetical to providing highly effective, low latency services.
Policy Enforcement
in ~25 Compute DCs
Virtual Firewall
Figure 73: “Onramp service edges” cannot deliver uniform policy enforcement from the edge.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 139
A Fast, Reliable, and Easy-to-Operate Zero Trust Architecture
The Zero Trust Exchange offers a variety of operational advantages that should
be considered as part of the overall solution architecture:
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 140
A Fast, Reliable, and Easy-to-Operate Zero Trust Architecture
Figure 74: ZDX interface showing the experience of the user across an organization.
1 18 13 4
I7ySIcF+i- <1ms 10.38.145.254 4ms 14.97.107.201 37ms 165.225.126.134 15ms 10.36.112.102 284ms 10.34.115.31
Dj3t+iU36n/o... Gateway Egress ZPA Service Edge App Connector
Private IP: 10.38.145.48 Tata Teleservices ISP broker10a.bom5. Unknown, Unknown
Public IP: 14.97.107.202 Gurgaon, Haryana, prod.zpat...
Gurgaon, Jaryana, IN India Unknown, Unknown
LAN-CORP
(IND-CHD3-tata)
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 141
A Fast, Reliable, and Easy-to-Operate Zero Trust Architecture
X
CONNECT
Verify where the access is going Verify where the access is going
Internal ERP service on port 23 in clear text Internal File share service on port 445
External new Social Media site on port 443, encrypted External video sharing site on port 443, encrypted
Report Card 09
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 142
A Fast, Reliable, and Easy-to-Operate Zero Trust Architecture
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 143
Getting Started
with Your
Zero Trust
Journey
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 144
Getting Started with Your Zero Trust Journey
The preceding sections covered seven elements of a highly successful zero trust
architecture–when employed successfully, these architectural practices can
rectify the inadequacies of legacy network and security architectures.
When a user authenticates with a VPN, the user generally gets full network IP
protocol access. Cybercriminals can then exploit this protocol or leverage it for
reconnaissance in the attack phase. Attackers can use it to probe networks and
data centers or, worse, steer ransomware to additional targets. Users connect to
a network using direct IP communication via an IP address, exposing the entire
network of listening ports to attackers. An attacker can then use a port scan of
subnets to obtain a full list of listening services open on the server.
Initiators who are authorized to connect to specific destinations will not be able
to learn, connect, or even identify network-level information. Connections to the
Zero Trust Exchange are completed only when allowed by policy and deemed
safe to be directed to the destination application.
The Zero Trust Exchange is an intelligent switchboard that uses policy to permit
connections to destination applications. The Zero Trust Exchange makes the
adoption of the often daunting zero trust concepts more feasible in today’s
world of cloud and mobility. Even when beginning with limited understanding
of application usage, the Zero Trust Exchange simplifies the operationalization
through intuitive policy frameworks.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 145
Getting Started with Your Zero Trust Journey
To achieve these zero trust benefits, it is important to begin the zero trust journey
by answering the following questions:
Begin by securing internet access and phasing out VPN technology for remote
users. This often starts with redirecting internet-bound traffic through the Zero
Trust Exchange with default filtering and access policies, while also sending critical
internal application traffic through the Zero Trust Exchange with a *.* access policy
to mimic existing VPN access.
1. Ensure that applications are accessed in the most direct way by dynamically
determining the optimal path to each application in a secure manner. With
users no longer on the enterprise network, companies are free to assess
which parts of their infrastructure are no longer needed.
2. Accumulate granular application inventory, not limited to IP address,
of accessed applications. Each time Zscaler determines the best path
for application access, it subsequently documents who accessed
which application.
3. Reduction of the attack surface, as key internal applications and the VPN
infrastructure are no longer publicly exposed.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 146
Getting Started with Your Zero Trust Journey
A simple example would entail documenting the servers, domains, and even
IP addresses that make up an enterprise application deployment. This will vary
from enterprise to enterprise, but at a high level
Definition of these groups and their controls allows enterprises to both determine
who can access which service and also how and under which circumstances. This
is useful for such purposes as isolating servers and services from any infrastructure,
user, application, etc., unless controlled and permitted by the Zero Trust Exchange.
By using the mapped inventory of applications, their groups, and rights, enterprises
can then lock down controls governing how workloads access resources. This is a
relatively simple process of
Following these steps, all other access would then be restricted and controlled.
Extend these capabilities with misconfiguration scanning via CNAPP and finally
with workload-to-workload, identity-based microsegmentation.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 147
Getting Started with Your Zero Trust Journey
Security Security
Secure work from anywhere; secure Advanced cyberthreat and data protection
internet, SaaS, private app access (granular policies)
Connectivity Connectivity
Phase out VPN infrastructure Hub-and-Spoke to Zero Trust SD-WAN
Security
Security Prevent misconfigurations (CSPM)
Secure cloud-to-internet, cloud-to-cloud, Correct entitlements (CIEM)
and cloud-to-DC connectivity App microsegmentation
Connectivity Connectivity
Eliminate virtual firewalls, Express Route, Eliminate virtual firewalls, Express Route,
Direct Connect site-to-site VPNs Direct Connect site-to-site VPNs
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 148
Getting Started with Your Zero Trust Journey
As this phased approach is followed, also ensure that the operationalization of zero
trust architecture is prioritized:
All in all, building a zero trust strategy around Zscaler’s Zero Trust Exchange
allows for the network and security transformation that ultimately enables
digital transformation.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 149
Appendix 1 -
Application
Segmentation
Primer
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 150
Appendix 1 - Application Segmentation Primer
Zscaler has a very powerful policy engine for building out granular application
access controls as necessary. This can facilitate restricting access, and even
visibility, to applications within your ecosystem.
1. The user’s presented access criteria, whether that be the SAML attributes
assigned to the users within your directory, device context, risk, etc.
2. The application that you are accessing. This is defined, but in actual fact,
this is the application context that the user (or the user’s device) is calling,
e.g., a file share on //fileserver1.company.local.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 151
Appendix 1 - Application Segmentation Primer
For both applications, customers already have access and control over the data sets.
Some control mechanism is likely being used to manage the addition and deletion
of users and groups, which can also be leveraged in building out a new policy for
access. Completing this leverages the prerequisite of building a SAML trust, which
likely would have been done during the initial phases of deployment.
So, let’s say a customer wants to enable access for its legal team to specific legal
applications. In this case (and in most situations), employees are probably already
grouped together within a Directory solution under a group or OU. In this case,
let’s call it Local_Legal.
Leveraging this existing group membership, when a user logs in to the IdP they
are given the SAML Attribute that shows them as part of the group Local_Legal.
Remember, the policy engine respects the SAML attribute. So, simply define a
rule that has the user SAML attribute criteria set as “Local_Legal”.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 152
Appendix 1 - Application Segmentation Primer
Once saved, anyone who logs in (remember, authenticating against the IdP) and
is assigned this SAML attribute can then access applications via the rule (or rules)
containing this SAML attribute as criteria.
This means that, when new employees join the legal department and are enrolled
in the directory and assigned to the Local_Legal group, they are immediately able
to access the necessary apps through Zscaler.
The user has inherited the access based on the attributes that you control in the
directory service. You probably already have a process to manage access to these
inheritances.
The Zero Trust Exchange applies access rules that you build based on the user
attributes and IdP uses.
Before diving into details, it is important to remember that the other half of the
policy is built on application segments. These are customer-built application
definitions. They can be hyperspecific–i.e., a single FQDN to a single port–
or broad enough to offer users generic access for visibility and application
usage discovery.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 153
Appendix 1 - Application Segmentation Primer
In the policy definition defining SAML criteria for access, it’s necessary to also
define the application segment available to users with this SAML attribute. But
let’s first look at the application segment definition.
The application segment definition is flexible and will allow you to define a
variety of domains, IPs, FQDNs, etc. While it is possible to define each individual
application or every IP address in use, this would require constant maintenance of
the policy.
Ideally, we ultimately want to define domain space in a way that meets all
requirements for that individual application space. So, if everyone on the legal
team must be able to access all legal servers (say there are 10) on port 443, why
would you build a policy listing each and every FQDN of the legal servers as a
separate rule?
Adding each server manually into the policy is acceptable, but it is cumbersome
and additional servers would need to be added manually.
Instead, group the servers into a single application segment, then configure a
single rule for access to these servers.
Now let’s recall that Zscaler actually validates access based on three factors:
1. What the user (or device) is requesting access to; for example, web
browser to legal1.company.local on port 80
2. What the user is allowed access to by policy; is the user allowed access
to legal1.company.local:80?
3. If the application access is permitted, is the application reachable at
legal1.company.local:80 from the App Connectors?
After answering these questions, define policy in such a way that, while static,
allows for dynamic access by managing the local DNS scope for app and server
names to match policies.
Ideally, if DNS granularity is established such that a set of legal servers share a
namespace subdomain, e.g., *.legal.company.com, then you would only need
your internal servers to have this naming convention.
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 154
Appendix 1 - Application Segmentation Primer
serv1.legal.company.com:443
serv2.legal.company.com:443
domains
serv3.legal.company.com:443
DNS *legal.company.com
serv4.legal.company.com:443
The goal is to simplify policy and management. Ultimately, it’s very helpful to
ensure that your applications and server names meet a constrained naming
convention. In the example above, all legal servers have the name servX.legal.
company.com, but the idea broadly applies. The key is ensuring the names of all
applications of this type fall into the defined namespace.
This enables the use of a stable and standardized policy that should be rarely
modified, if only to allow exceptions to the rule. Thus, after establishing the policy
framework, you would ideally be able to leverage your DNS landscape and existing
change management process to add and remove access to allowed users.
Figure 72
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 155
Appendix 1 - Application Segmentation Primer
Getting to the point where you can roll out this policy does require some specific
efforts on the local customer network side.
1. Defining and refining your domain space, e.g., what network namespaces
and subdomains exist, and where they reside within your organization.
This DNS namespace can then be used in policy.
2. Ensuring your DNS naming convention is defined and used by the
applications in the element. The policy will not permit access if you have
defined *.legal.company.com for access and then your user attempts to
access legal1.company.com. Note: For existing apps, you can use CNAMEs
on your DNS side as long as the CNAME is called by the client-side.
3. Understanding the necessary ports associated with each application.
For example, you can define all of the SSH access under one app segment
group with just TCP 22. Similarly, you can define access to all SAP servers
on the full set of ports used by SAP.
The above steps should enable access for authorized users to the necessary and
allowed applications, without the need to constantly update your policy. After
achieving control and understanding of user groups and the application landscape,
building a flexible policy is simple.
ZPA Portal
BA 2 users *.sap.company.com
ZPA users Naming Convention
SAML Criteria App Segments Domains
BA 3 users *.crm.company.com
Policy
BA 4 users *.hr.company.com
Connectors
LDAP BA 1 BA 2 BA 3 BA 4 DNS
Connector Connector Connector Connector
Group Group Group Group
© 2022 Zscaler, Inc. All rights reserved. Seven Elements of Highly Successful Zero Trust Architecture 156
zscaler.com © 2022 Zscaler, Inc. All rights reserved.