Cisco 1
Cisco 1
Cisco Public
January, 2023
Traditional security approaches assume that anything inside the corporate network can be trusted. The reality is
that this assumption no longer holds true, thanks to mobility, BYOD (Bring Your Own Device), IoT (Internet of
Things), cloud adoption, increased collaboration, and a focus on business resiliency. A zero-trust model
considers all resources to be external and continuously verifies trust before granting only the required access.
The key to comprehensive Zero Trust is extending security throughout the entire network environment with
examples such as:
● Employees accessing sensitive applications, both on and off the enterprise network
● Contractors and guests using the network infrastructure
● Application to application communications
● Communication between industrial control systems
Security is not a one-size-fits-all and Zero Trust is more than network segmentation. To help understand the
architecture, Cisco has broken it down into three pillars:
● User and Device Security: making sure users and devices can be trusted as they access systems,
regardless of location
This architecture guide is focused on the Cisco Zero Trust Framework with the User and Device Security,
Application and Data Security, and Network and Cloud Security pillars. If interested in how Cisco products map
to other Zero Trust Frameworks, refer to Zero Trust Frameworks.
User and Device Security
User and Device Security provides solutions that establish trust in users and devices through authentication and
continuous monitoring of each access attempt, with custom security policies that protect every application.
With a zero-trust approach to securing users and devices, you can help prevent or mitigate against several
different types of attacks that target users and devices in this new perimeter-less world:
Threat Icon Threat Name Threat Description
● Are my users really who they say they are? Verify the identity of every user, regardless of type
(contractors, vendors, third-party providers, partners, remote users, employees, temporary workers,
etc.)
● What devices are connecting to my applications and data Get visibility into every type of device, both
managed or unmanaged (mobile, laptops, and desktops; company-issued, -owned, or -managed; user-
owned)
● Who or what is allowed to access my applications and data? By enforcing adaptive access policies,
you can limit access to enterprise applications and data based on user role, type of device, security
health of user devices, user group, application type, and much more
● How can I enable remote, frictionless access for all users? With a remote-access proxy, you can
enable access to multi-cloud environments, web applications, servers, VPNs, and more for employees,
remote workers, and contractors. With Single Sign-On (SSO), you can allow users to securely access
their cloud and on-premises applications seamlessly by logging in just once
Network and Cloud Security
Network and Cloud Security enables users to securely connect to your network from any devices, anywhere
while restricting access from non-compliant devices. Automated network-segmentation capabilities enable
administrators to set policy for users, devices, and application traffic without requiring network redesign.
With a zero-trust approach to securing the workplace, you can help prevent or mitigate against several different
types of attacks that target the network:
Threat Icon Threat Name Threat Description
In an enterprise architecture, the network may span multiple domains, locations, or sites such as main
campuses and remote branches, each with multiple devices, services, and policies. A Zero Trust solution
should demand an end-to-end architecture that ensures consistency in terms of connectivity, segmentation,
and policy across the full spectrum of the network.
Zero Trust for the network and application security enables network administrators to:
● Know who is on the network. To truly secure the network, you need to know what is connecting to it.
For managed devices, such as laptops and smartphones, mobile device management (MDM) can be
used to determine what the connecting device is what it says it is. For unmanaged devices, such as
Enterprise networks are increasingly becoming more complex as applications move to multi-cloud and leverage
containers and microservices, effectively creating new security, reporting, and compliance challenges. With a
zero-trust approach to securing applications and data, you can help prevent or mitigate against several different
types of attacks that target applications:
Threat Icon Threat Name Threat Description
The need for comprehensive visibility of all network traffic down to the individual workload level for effective
security policy management and enforcement has never been more important than now. The ideal end state of
your zero trust for the workloads solution would allow your enterprise to answer the following:
● Endpoint Security
● Secure Internet Gateway
● Application Workload Security
Endpoint Security
Endpoint security solutions protect endpoints such as mobile devices, desktops, laptops, and even medical and
IoT devices. Endpoints are a popular attack vector, and the goal of an attacker is to not only compromise the
endpoint but also to gain access to the network and the valuable assets within.
Security practices such as turning on disk encryption, disabling automatic login, and installing anti-virus help
ensure an endpoint is “healthy” when joining the network or accessing an application.
Capability Icon Capability Name Capability Description
The Web security connector redirects all web traffic to a full web
Web Security Connector
proxy that provides secure web gateway security services.
A Secure Internet Gateway (SIG) unifies multiple functions in a single solution that traditionally required a set of
on-premises security appliances (firewalls, proxies, gateways) or single function cloud-based security
solutions.
Capability Icon Capability Name Capability Description
Application Visibility & Control Visibility and access control to approved web applications.
A full proxy that can log and inspect all your web traffic for
greater transparency, control, and protection. IPsec tunnels, PAC
Web Security files and proxy chaining can be used to forward traffic for full
visibility, URL and application-level controls, and advanced
threat protection.
Application Workload Security includes measures at the application level that aim to prevent data or code within
the application from being stolen or hijacked. It encompasses the security considerations that happen during
application development and design, but it also involves systems and approaches to protect applications after
they get deployed.
All application servers should be hardened and follow security practices such as disabling root access, using
SNMPv3 instead of SNMPv2, enabling certificate-based authentication for web clients, etc.
Tagging/Grouping for Software Segmentation using Endpoint Groups (EPG), TrustSec Security
Defined Policy Group Tag (SGT), or VLANs.
The capabilities required to protect the business flow are represented above. This is a consolidated view of the
business flows with capabilities. The detail business flows with the security capability groups expanded out can
be found in the Appendix C.
The Common Flow Capabilities grouping is a common set of capabilities that applies to all flows.
Zero Trust Business Flows - Capability Mapping by Zero Trust Pillar
The mapping of security capabilities to zero trust pillar are represented below for each of the zero trust
business flows.
Cisco Umbrella
Cisco Secure Firewall
Cisco Secure Workload
Cisco AppDynamics
Application Visibility & Control
Cisco Secure Application
Cisco Secure Web Appliance
Cisco Cloudlock
Cisco Meraki
Cisco Cloudlock
Data Loss Prevention
Cisco Umbrella
Cisco Meraki
Software Defined-WAN (SD-WAN)
Cisco Viptela
Cisco Umbrella
TLS/SSL Decryption
Radware Alteon
Kenna Security
Vulnerability Management
Cisco Secure Workload
Radware WAF
Web Application Firewall
Radware kWAF
Cisco Umbrella
Web Reputation Filtering
Cisco Secure Web Appliance
Cisco Umbrella
Web Security
Cisco Secure Web Appliance
Remote Employee with Trusted Device: Accessing Private Application (any tcp/udp) (Private DC/IaaS)
Appendix F - Feedback
If you have feedback on this design guide or any of the Cisco Security design guides, please send an email to
[email protected].