Achieving Zero Trust Architecture (ZTA) using Forum Sentry Policy Enforcement Points
The National Institute for Standards and Technology has issued a special publication NIST SP 800-207 defining the architecture and concepts for deploying successful ZTA.
“Zero Trust Architecture is an end-to-end approach to network/data security that encompasses identity, credentials, access management, operations, endpoints, hosting environments, and the interconnecting infrastructure. Zero trust is an architectural approach that is focused on data protection.
…
In Figure 1, a user or machine needs access to an enterprise resource. Access is granted through a 365 Policy Decision Point (PDP) and corresponding Policy Enforcement Point (PEP).
Policy Enforcement Point (PEP): This system is responsible for enabling, monitoring, and terminating connections between a subject and an enterprise resource.
While Policy Enforcement Points may claim that they provide access control, there are significant risks involved in deploying non cyber-hardened PEPs. This is because in a Zero Trust Architecture, the PEP itself is a critical decision point, and becomes by nature of the architecture itself, the target of attack.
Issues with non-secure PEPs:
Open Architecture Without proper architecture design, open architecture solutions can be hacked or reverse engineered
Not Hardened The PEP solution must be hardened against compromise. This includes a locked down, secure OS, self-health integrity checks, and inability to gain root or shell access.
Agent Based PEP agents are software shims that are not designed to be cyber-hardened and thus are susceptible to compromise by attacks directly on the PEP solution, or on the underlying code hosting the agent.
Developer Centric Agent and Adapter based PEPs rely on developer-centric security where repeatable security is difficult and case-by-case integrations increase risk.
Limited Protocols Limits in the underlying technology of PEPs also limit the ability to include legacy systems in the ZTA architecture model, thus causing exceptions and other constraints to increase risk.
Forum Sentry Cyber-Secure PEP
Built-In Zero Trust Capabilities
Transport Security
Message Security
Threat Mitigation
Data Integrity Assurance
Data Privacy Assurance
Identity and SSO
Data Translation
Real-time Monitoring and Logging
Forum Sentry has achieved FIPS 140-2 Level II, Common Criteria EAL NDPP, and DoD PKI certification. The product architecture is designed with tamper-proof self-health checks and Known Algorithm Test (KAT) validations to detect and prevent compromise. Forum Sentry provides integrated PKI, IDP, DLP, AV, and deep context data analysis engines that combine with the built-in identity, access control, authentication and authorization capability for dynamic and secure PEP enforcement. Furthermore, Forum Sentry captures transaction information bi-directionally into unique session identifiers for contextual logging, auditing, and real-time monitoring. Forum Sentry provides integration with AI machine learning for advanced predictive analytics of PEP message flows.
Example ZT Scenarios ( as demonstrated in ATARC labs )
zt-secnario-1
zt-secnario-2
zt-secnario-3
zt-secnario-4
zt-secnario-5
Would you like to learn more?
Contact us for more information or to schedule a live demonstration.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site you are confirming that you accept the use of cookies.Ok