Palo Alto Networks Blog 2024年08月07日
Palo Alto Networks Zero Trust Platform Featured in New NIST Guidance
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

在过去三年中,美国国家标准与技术研究院 (NIST) 与 Palo Alto Networks 合作,构建了端到端的零信任架构,并发布了关于实施零信任架构的 NIST 特别出版物 1800-53。该出版物为任何希望开始或完善其零信任之旅的组织提供了高层次的战略蓝图。

📑 **持续信任和验证:**为了有效地实施零信任,组织需要在所有位置、用户和应用程序上进行持续的信任验证和一致的策略执行。Palo Alto Networks 的 NIST 实验室构建(企业 1,构建 5)包含了跨网络安全、云交付服务、云安全和单供应商 SASE(SSE+SD-WAN)的原生集成功能,从而保护了从本地到远程工作的各种零信任用例。

📥 **单一策略执行:**组织通常管理着数十个安全供应商,这些供应商通常缺乏互操作性,使得一致的安全执行变得不可能。Palo Alto Networks 通过部署 Strata Cloud Manager 和 Panorama 解决方案展示了平台化方法,为所有安全基础设施提供单一管理和操作层。

📢 **多供应商互操作性:**组织需要能够有效地将自己的安全平台与已经部署在其环境中的第三方工具集成。Palo Alto Networks 展示了其广泛的技术集成,使这三个平台更加强大,简化了客户的安全。在 NIST 实验室中,我们技术上展示了与零信任生态系统中关键合作伙伴的第三方集成,包括 AWS、Microsoft、Okta、Radiant Logic、SailPoint、Tenable、IBM 的 QRadar 等。

📡 **NIST 特别出版物 1800-53:**该出版物描述了 Palo Alto Networks 如何利用其核心功能(如用户 ID、应用程序 ID 和设备 ID)在下一代防火墙(基于硬件、虚拟化和容器化形式)、Prisma Access 和 Cortex XDR 上实现一致的零信任策略执行。它还详细介绍了如何使用 Palo Alto Networks 的技术在 NIST 实验室中构建企业 1 构建 5,并详细说明了如何安装、配置和集成所有技术。

📣 **NIST 实验室构建:**该出版物描述了 Palo Alto Networks 如何在 NIST 实验室中构建企业 1 构建 5,这是一个端到端的零信任解决方案,它包含了多种 Palo Alto Networks 技术,包括下一代防火墙、Panorama、GlobalProtect、Strata Cloud Manager、Prisma SASE(Prisma Access 和 Prisma SD-WAN)、云身份引擎(Okta 集成)和云交付安全服务(高级威胁防护、高级 WildFire、高级 URL 过滤、DNS 安全、企业 DLP)。

Over 15 years since its initial conception, and more than three years since the U.S. federal government made it a fundamental tenet of its overall cybersecurity strategy, Zero Trust has only become a more important strategic framework for government and critical infrastructure alike.

The strategic emphasis on Zero Trust implementation in high-level U.S. government policies, like the Presidential Executive Order on Improving the Nation's Cybersecurity, made it clear that federal departments and private enterprises should consider Zero Trust architecture (ZTA) implementation. But, the question of how has been less clear. To address that knowledge gap, the U.S. federal Zero Trust Strategy advised organizations to look toward an authoritative source of cybersecurity standards and best practices for guidance – the U.S. National Institute of Standards and Technology (NIST).

That's why, just over three years ago, Palo Alto Networks was honored to announce our initial selection to join NIST’s National Cybersecurity Center of Excellence’s Zero Trust Architecture (ZTA) lab. Following our selection, a team from Palo Alto Networks went hard at work, partnering with NIST and industry peers to build end-to-end Zero Trust architectures in NIST’s labs by leveraging a broad range of Palo Alto Networks technologies.

The result: NIST Special Publication 1800-53 on Implementing a Zero Trust Architecture, a high-level strategic blueprint for any organization looking to start or mature their own Zero Trust journeys. NIST also published a more extensive web version of the Special Publication, including technical details about how to specifically deploy and configure several technologies by Palo Alto Networks to achieve Zero Trust outcomes. For easy reference, the table below highlights the key Palo Alto Networks references throughout the Special Publication.

The overall goal of Palo Alto Networks partnering with NIST was to demonstrate that it is possible to build interoperable, end-to-end Zero Trust architectures, reducing the operational integration challenges that so often prevent organizations from practically implementing Zero Trust. To address these barriers, we embraced a few fundamental principles that define our Zero Trust strategy:

Continuous Trust and Verification

Single Policy Enforcement — Any User, Any Application, Any Location

Multi-Vendor Interoperability

Curious about the new NIST Special Publication on Zero Trust Architecture and how you can deploy and configure Palo Alto Networks technologies to achieve your own Zero Trust goals? Check out this quick reference guide for an overview of how Palo Alto Networks was featured:

NIST Special Publication 1800-53: Zero Trust Architecture
Quick Reference: Palo Alto Networks References

Project Overview

Describes how core Palo Alto Networks capabilities like User-ID, App-ID and Device-ID enable consistent Zero Trust policy enforcement across Next Generation Firewall (hardware-based, virtualized and containerized form factors), Prisma Access and Cortex XDR.

Architecture and Builds: ZTA Laboratory Physical Architecture

Describes how Palo Alto Networks Next Generation Firewall (PA-5250) was used to protect the internet access point for NIST’s entire ZTA lab, and how a single PA-5250 NGFW (split into virtual systems) was used to protect the network perimeter for each of the lab’s five simulated enterprises and branch offices.

Builds Architecture Details: Enterprise 1, Build 5

Features Enterprise 1 Build 5, an end-to-end ZTA solution that features numerous Palo Alto Networks technologies: 

  • Next Generation Firewall
  • Panorama 
  • GlobalProtect 
  • Strata Cloud Manager 
  • Prisma SASE (Prisma Access and Prisma SD-WAN) 
  • Cloud Identity Engine (Okta Integration) 
  • Cloud Delivered Security Services (Advanced Threat Protection, Advanced WildFire, Advanced URL Filtering, DNS Security, Enterprise DLP)
How-To Guide: Enterprise 1, Build 5

Describes detailed instructions for installing, configuring and integrating all of the Palo Alto Networks technologies (listed above) used to implement Enterprise 1, Build 5.

Functional Demonstration: Enterprise 1, Build 5

Describes how Palo Alto Networks technologies featured in Enterprise 1, Build 5 were tested and validated by NIST as technically meeting several defined Zero Trust use cases and scenarios.

 

The post Palo Alto Networks Zero Trust Platform Featured in New NIST Guidance appeared first on Palo Alto Networks Blog.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

零信任 网络安全 NIST Palo Alto Networks
相关文章