The U.S. Department of Defense’s new document, Zero Trust Overlays, provides the most up-to-date guidance for applying zero trust concepts in DoD organizations. The document builds upon prior publications such as the DoD’s Zero Trust Reference Architecture and Zero Trust Roadmap as well as NIST’s Risk Management Framework and SP 800-53 security controls. And like these source documents, Zero Trust Overlays consistently emphasizes the importance of firmware and supply chain security in the context of Zero Trust.
Zero Trust Overlays organizes its approach into 7 key “pillars,” which address key areas of focus such as Users, Devices, Applications, Data, and Networks. And in this context a device refers to:
…any asset (including its hardware, software, firmware, etc.) that can connect to a network, including servers, desktop and laptop machines, printers, mobile phones, IoT devices, networking equipment, and more.
This is important because it not only calls out that Zero Trust applies to all types of devices, but it also highlights the components that devices are made of. A device isn’t just a single checkbox entity—it is a constellation of various hardware, firmware, and software components that will need to be evaluated in a Zero Trust context.
But what does that entail in an actual security practice? Let’s take a look at how a supply chain security platform can address the following five key tenets of zero trust as defined in Zero Trust Overlays:
Zero Trust Tenets | How Supply Chain Security Helps |
---|---|
Assume a Hostile Environment | All devices (including their hardware, firmware, and software) must be treated as untrusted, and this requires teams to know exactly what components are in their environments and if they are authentic and do not contain implants or backdoors. A supply chain security platform can discover and provide a detailed component inventory across PCs, servers, network devices, virtualization infrastructure and more. |
Presume Breach | Attackers increasingly seek to compromise devices in the supply chain and/or in firmware as a way to evade security and maintain persistence. Supply chain security platforms can assess devices to identify known and unknown threats such as firmware implants, backdoors, and bootkits/rootkits. |
Never Trust, Always Verify | Security is dynamic, and devices should be continually reassessed before access is granted to a resource. Supply chain security platforms can continuously monitor devices and their components. Alerts can also be triggered based on detected risks or unexpected changes from established device baselines. |
Scrutinize Explicitly | Devices should be assessed across a variety of attributes. Supply chain platforms provide detailed analysis of each device and component, identifying low-level vulnerabilities, misconfigurations, outdated code, or indicators of compromise. |
Apply Unified Analytics | Supply chain security platforms can analyze the actual behavior of firmware and device-level components in order to identify anomalies and actions associated with novel or unknown threats. |
While the tenets provide the high-level direction, the details are defined by specific NIST’s SP 800-53 security controls. Given the importance of supply chain and firmware security in SP 800-53, it should be no surprise that these topics are prominently featured in Zero Trust Overlays as well. In fact each term is referenced dozens of times across various controls and Zero Trust pillars.
Key security controls include:
Configuration Management (CM)
CM-2 Baseline Configuration
CM-6 Configuration Settings
CM-14: Signed Components
System and Services Acquisition (SA)
SA-10(1) Software and Firmware Integrity Verification
Risk Assessment (RA)
RA-3(1) Supply Chain Risk Assessment
RA-5 Vulnerability Monitoring and Scanning
System and Information Integrity Media Protection (SI)
SI-2(5) Automatic Software and Firmware Updates
SI-4(17): Integrated Situational Awareness
SI-7 Software, Firmware, and Information Integrity
Incorporate the detection of unauthorized changes into the organizational incident response capability to help ensure detected events are tracked, monitored, corrected, and available for historical purposes.
Supply Chain Risk Management (SR)
SR-3 Supply Chain Controls and Processes
SR-4 Supply Chain Integrity
Zero Trust Overlays is the latest in what has been a very consistent drumbeat of guidance from U.S. agencies and the DoD specifically. Zero Trust requires organizations to continually assess the most fundamental aspects of their technology. And this must include the most fundamental components, code, and supply chains that underpin the technology we rely on.
The Eclypsium supply chain security platform has specialized capabilities that allow customers to audit assets and find problems that are not visible to traditional security tools. Most importantly, Eclypsium performs these tasks in a highly automated fashion without the need for staff to develop new specialized skills. This ensures that organizations can not only meet their Zero Trust requirements, but have powerful visibility into virtually any class of asset or technology. If you would like to learn more, please contact the Eclypsium team at [email protected].
Related resources:
The post What You Need to Know to Align With the DoD’s New Zero Trust Overlays appeared first on Eclypsium | Supply Chain Security for the Modern Enterprise.
*** This is a Security Bloggers Network syndicated blog from Eclypsium | Supply Chain Security for the Modern Enterprise authored by Ariella Robison. Read the original post at: https://eclypsium.com/blog/what-you-need-to-know-to-align-with-the-dods-new-zero-trust-overlays/