{"id":104737,"date":"2020-01-06T06:00:39","date_gmt":"2020-01-06T14:00:39","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=104737"},"modified":"2020-03-30T02:19:20","modified_gmt":"2020-03-30T09:19:20","slug":"cloud-zero-trust-network-access","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/01\/cloud-zero-trust-network-access\/","title":{"rendered":"Zero Trust Network Access: Build Your SASE on a Solid Foundation"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">By Jason Georgi, Field CTO, Prisma<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Applications moving to the cloud and increased user mobility are changing the way networking and network security services must be delivered. Palo Alto Networks founder and CTO Nir Zuk believes that the future of network security is in the cloud, and has been driving this change for the past few years with Prisma Access, the industry\u2019s most comprehensive SASE. In this ongoing series, Palo Alto Networks thought leaders explore the core tenets of an integrated, effective SASE solution, and more broadly, its implementation and implications.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Network architecture is evolving. This is especially true when considering that applications are in a range of locations and it\u2019s not always going to be practical (or sensible) to send traffic back to the corporate data center or HQ for security. In today\u2019s always-on, internet-based world, users and apps are everywhere, and the lack of visibility and enforcement are introducing new security problems. These challenges are compounded when network architectures have to evolve to ensure a better user experience. To protect your business, as network architecture evolves, so must the security model.<\/span><\/p>\n<p><b>Users, Apps and Data: the Recipe for Zero Trust Network Access\u00a0<\/b><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-proxy-server\"><span style=\"font-weight: 400;\">Proxies<\/span><\/a><span style=\"font-weight: 400;\"> may seem like an easy solution to control and secure access to cloud apps, but if you\u2019re like most organizations, you have some apps that cannot sit behind a proxy due to the protocols they use. If these apps are protected by a firewall, why use different protections in different areas? This question is especially relevant if you\u2019re looking to \u201clift and shift\u201d applications from your data center to a public cloud service. Your security approach needs to be able to inspect any application\u2019s traffic, regardless of the protocols in use. Organizations need to apply better control and stronger protection with full Layer 7 content inspection in order to gain complete visibility into where users are connecting from, what applications they are using, what they are doing with the applications and what data they are trying to access. No proxy can do this.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therein lies the need for <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-zero-trust-for-the-cloud\"><span style=\"font-weight: 400;\">Zero Trust Network Access<\/span><\/a><span style=\"font-weight: 400;\"> (ZTNA). By applying the Zero Trust mantra, <\/span><i><span style=\"font-weight: 400;\">\u201cNever trust, always verify,\u201d<\/span><\/i><span style=\"font-weight: 400;\"> organizations can ensure proper user context through authentication and attribute verification before allowing access to apps and data in the cloud or data center. A true ZTNA approach requires full content inspection to identify users and ensure policies can be applied to restrict access and ensure proper behavior once access is granted, regardless of application type. This allows organizations to minimize data loss and quickly mitigate security issues or threats that may arise. Trusting what happens within the session once access is granted by policy is not Zero Trust, it is a recipe for disaster, especially when granting access to unmanaged devices, third parties, and unknown bad actors.<\/span><\/p>\n<p><b>All-in-one ZTNA Solutions Don\u2019t Exist<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Many products today claim to solve ZTNA through software-defined perimeter (SDP), identity access management (IAM), browser isolation (BI\/RBI) or other solutions. However, these point solutions don\u2019t address content inspection. Organizations can experience a false sense of security when traffic is sometimes inspected and sometimes not. To achieve full content inspection and consistent protection, organizations must make sure that they define their requirements properly. This results in more solutions that organizations must customize, manage and maintain, adding to the complexity of an already difficult task. So how can organizations achieve ZTNA without adding large bundles of non-integrated security products?<\/span><\/p>\n<p><b>Network Architecture Has Evolved: Introducing SASE<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As the world has evolved and extended to the cloud, so must network and security architectures. Utilizing multiple point products not only makes management and visibility difficult, it also creates security gaps; more policies to manage means more opportunities for misconfiguration. We believe these challenges are being addressed by a new model Gartner has developed, combining networking and security services into one cloud-delivered platform, called \u201csecure access service edge,\u201d or <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-sase\"><span style=\"font-weight: 400;\">SASE <\/span><\/a><span style=\"font-weight: 400;\">(pronounced \u201csassy\u201d).\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><a href=\"http:\/\/go.paloaltonetworks.com\/sasegartner\"><span style=\"font-weight: 400;\">Gartner<\/span><\/a><span style=\"font-weight: 400;\">, \u201cBy 2023, 20% of enterprises will have adopted secure web gateway (SWG), <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/11\/cloud-casb-sase\/\"><span style=\"font-weight: 400;\">cloud access security broker<\/span><\/a><span style=\"font-weight: 400;\"> (CASB), ZTNA and branch <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-firewall-as-a-service\"><span style=\"font-weight: 400;\">firewall as a service<\/span><\/a><span style=\"font-weight: 400;\"> (FWaaS) capabilities from the same vendor, up from less than 5% in 2019.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To that end, <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/access\"><span style=\"font-weight: 400;\">Prisma&#x2122; Access<\/span><\/a><span style=\"font-weight: 400;\">, by Palo Alto Networks, is a single, comprehensive solution that provides all of the networking and security services that organizations need in a SASE architecture designed for all traffic, all applications and all users.<\/span><\/p>\n<p><b>SASE with a Side of ZTNA<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Simple policies and easy management are key for a SASE solution. Prisma Access is based on the key ZTNA principles, extending them across all the services within a SASE solution. By identifying and controlling users, devices and applications, irrespective of where they are, organizations can benefit from using a single cloud solution for ALL of their connectivity and security needs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Read our <\/span><a href=\"https:\/\/start.paloaltonetworks.com\/apply-zero-trust-cloud-environments.html\"><span style=\"font-weight: 400;\">Applying Zero Trust to Cloud Environments<\/span><\/a><span style=\"font-weight: 400;\"> whitepaper to learn more.<\/span><\/p>\n<p><i><span style=\"font-weight: 400;\">Gartner, The Future of Network Security Is in the Cloud, Neil MacDonald, Lawrence Orans, Joe Skorupa, 30 August 2019<\/span><\/i><\/p>\n<p><i><span style=\"font-weight: 400;\">Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner\u2019s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.<\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Prisma Access is based on the key zero trust network access principles, extending them across all the services within a SASE solution.<\/p>\n","protected":false},"author":663,"featured_media":104767,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[6833,6881,7006,73],"coauthors":[6832],"class_list":["post-104737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-prisma-access","tag-sase","tag-secure-access-service-edge","tag-zero-trust"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/01\/Screen-Shot-2019-12-31-at-3.34.06-PM.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/663"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=104737"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104737\/revisions"}],"predecessor-version":[{"id":104753,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/104737\/revisions\/104753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/104767"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=104737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=104737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=104737"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=104737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}