{"id":116156,"date":"2020-07-20T18:00:05","date_gmt":"2020-07-21T01:00:05","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=116156"},"modified":"2020-07-20T16:16:02","modified_gmt":"2020-07-20T23:16:02","slug":"cloud-zero-trust-for-cloud","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/07\/cloud-zero-trust-for-cloud\/","title":{"rendered":"Zero Trust for Cloud Users and Environments"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As the majority of organizations move into a multi-cloud world, new challenges for Zero Trust are emerging.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations are experimenting with different architectures for cloud infrastructure. Research into the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/cloud-native-security-genome\/\"><span style=\"font-weight: 400;\">state of cloud native security<\/span><\/a><span style=\"font-weight: 400;\"> shows that 80% of security professionals feel their cloud environment is constantly shifting. This makes sense given that these environments are inherently ephemeral \u2013 developers can spin up new instances and resources in a matter of minutes, and destroy them just as quickly.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Trying to figure out what or who is in your environment, let alone establishing a baseline for what is normal, can feel chaotic. In order to maintain <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/network-end-to-end-zero-trust\/\"><span style=\"font-weight: 400;\">Zero Trust<\/span><\/a><span style=\"font-weight: 400;\"> for cloud, compliance and security teams need tools that can help continuously enforce policies.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Multi-cloud Compliance and Visibility<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">With so many organizations constantly changing their cloud architectures, simply cataloging these different environments and ensuring that they adhere to any industry compliance regulations becomes increasingly time-consuming.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to maintain a Zero Trust approach, organizations should look for a <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-a-cloud-native-security-platform\"><span style=\"font-weight: 400;\">cloud native security platform<\/span><\/a><span style=\"font-weight: 400;\"> (CNSP) that can provide visibility into all types of workloads and offer policy engines that alert about any misconfigurations across multiple cloud service providers (CSPs). These integrated tools help security, compliance and development teams prevent configuration drift and quickly remediate issues across cloud environments.\u00a0\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Prisma Cloud is one such CNSP that can provide multi-cloud visibility and help manage regulatory compliance across multiple environments. Dashboards show ingested data from multiple sources within a single pane of glass, and alerts are automatically prioritized with context. Prisma cloud then recommends fixes to help users quickly validate workloads and applications.<\/span><\/p>\n<figure id=\"attachment_116171\" aria-describedby=\"caption-attachment-116171\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:60.78%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-116171 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cloud-secops.png\" alt=\"Multi-cloud dashboard in Prisma Cloud\" width=\"900\" height=\"547\" \/><\/span><\/div><figcaption id=\"caption-attachment-116171\" class=\"wp-caption-text\">Image 1: Multi-cloud dashboard in Prisma Cloud<\/figcaption><\/figure>\n<h2><\/h2>\n<h2><span style=\"font-weight: 400;\">Cloud User Identity<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While managing the \u201c<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/06\/cloud-native-security-genome\/\"><span style=\"font-weight: 400;\">multi-everything<\/span><\/a><span style=\"font-weight: 400;\">\u201d nature of the cloud poses security challenges, for many organizations, managing users presents a larger obstacle.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With a Zero Trust approach, access control must be handled with a least-privileged strategy and logs must be continuously monitored for any anomalous behaviors. When users are spread among different cloud service providers and accounts, the complexity involved in establishing a Zero Trust architecture rises further.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While the threats of unusual user activity, account hijacking attempts and excessive login failures exist in any environment, managing them is paramount in a successful Zero Trust model for cloud. The implementation of a <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/01\/cloud-ueba\/\"><span style=\"font-weight: 400;\">user and entity behavior analytics (UEBA)<\/span><\/a><span style=\"font-weight: 400;\"> engine can help provide a clearer picture of user activities. Machine learning can be leveraged to monitor the logs coming in from multiple sources, creating a baseline of normal activity and triggering alerts on any deviations from this baseline.<\/span><\/p>\n<figure id=\"attachment_116184\" aria-describedby=\"caption-attachment-116184\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:61.11%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-116184 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cloud-investigate.png\" alt=\"UEBA investigation trending view in Prisma Cloud\" width=\"900\" height=\"550\" \/><\/span><\/div><figcaption id=\"caption-attachment-116184\" class=\"wp-caption-text\">Image 2: UEBA investigation trending view in Prisma Cloud<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">Prisma Cloud provides the UEBA functionalities needed for managing users with Zero Trust across multiple cloud platforms. It can alert on threats mentioned above as well as other malicious activities. In addition, Prisma Cloud performs continuous monitoring of cloud account roles, password policies and multi-factor authentication (MFA) use through a customizable policy engine.\u00a0<\/span><\/p>\n<figure id=\"attachment_116197\" aria-describedby=\"caption-attachment-116197\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:61.11%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-116197 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/07\/cloud-policies2.png\" alt=\"Password policy view in Prisma Cloud\" width=\"900\" height=\"550\" \/><\/span><\/div><figcaption id=\"caption-attachment-116197\" class=\"wp-caption-text\">Image 3: Password policy view in Prisma Cloud<\/figcaption><\/figure>\n<h2><\/h2>\n<h2><span style=\"font-weight: 400;\">Cloud Native Zero Trust<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">No matter the size of the organization, the multi-everything approach to cloud is here to stay. While working with a mix of different CSPs and private clouds adds a level of complexity for Zero Trust, maintaining visibility and control can be made simpler with cloud native tools built for the job.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Identity and compliance policies are one component of an enterprise Zero Trust strategy. Be sure to check out the rest of the blogs in our <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/zero-trust-throughout-your-infrastructure\/\"><span style=\"font-weight: 400;\">Zero Trust Throughout Your Infrastructure<\/span><\/a><span style=\"font-weight: 400;\"> series.\u00a0 Or you can watch as Palo Alto Networks Founder and CTO Nir Zuk explains how it all fits together in this video.<\/span><\/p>\n<p><div class=\"styleIt\" style=\"width:560px;height:315px;\"><lite-youtube videoid=\"zzZ4q9DSnbg\" ><\/lite-youtube><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Maintaining Zero Trust for cloud can get complicated, especially in multi-cloud environments, but there are tools that can help.<\/p>\n","protected":false},"author":656,"featured_media":116158,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[6594,6890,73,7129],"coauthors":[6809],"class_list":["post-116156","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-cloud-compliance","tag-prisma-cloud","tag-zero-trust","tag-zero-trust-throughout-your-infrastructure"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/07\/prisma-blog-image2.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/116156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/656"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=116156"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/116156\/revisions"}],"predecessor-version":[{"id":116236,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/116156\/revisions\/116236"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/116158"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=116156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=116156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=116156"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=116156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}