Zero trust architecture prioritises access and restrictions to assure security by assuming there is no trustworthy user.

The goal is to implement zero-trust across all traffic so that there are no weaknesses across users, devices, networks and systems.

Aruba ESP and Edge-to-Cloud Security apply rigorous security best practices and controls to previously trusted network resources.

Here are the five zero trust best practices:

  1. Visibility

Full-spectrum visibility of all devices and users on the network forms the backbone of zero trust. Visibility is necessary to know what devices are connected to or attempting to connect to the network, from user devices to enterprise systems.

Aruba ESP with Edge-to-Cloud Security has comprehensive visibility, giving you a centralised dashboard for managing all users in real-time.

  1. Authentication

When possible, devices and users should be identified and properly authenticated before granting network access. Devices and users should also be restricted to what they can do on the network based on their credentials.

Best practices include full 802.1X and multi-factor authentication for user devices. You also need an access control policy.

  1. Role-based access control

Users and devices should have context-based access to apps and systems, while dynamic segmentation allows large workforces to get things done. Micro-segmentation is necessary to ensure only privileged users have access to sensitive systems.

Aruba ESP with Edge-to-Cloud Security includes dynamic segmentation, letting you define all user roles to assure minimum access.

  1. Continuous monitoring

Visibility over users is not enough. You also need continuous monitoring of users and devices. Monitoring can identify odd behaviour and give IT time to investigate and act on anything that appears suspicious or against best practices.

Continuous monitoring combats insider threats, advanced malware, and persistent threats, giving you an enhanced layer of protection.

  1. Enforcement and response

Your zero trust architecture needs built-in enforcements for firewalls and WPA3 standards. Ideally, it should integrate with security solutions that you use, letting you respond to all issues using the best tool for the job.

Aruba Central, ClearPass Policy Manager, and the Policy Enforcement Firewall provide the basic requirements. At the same time, over 150 integrations with security and authentication tools mean you can build security into all layers of your network.

Overall, Aruba’s zero-trust solutions build trust into the devices, systems, apps and services on your network. They protect devices with defined policies and reduce the vulnerabilities associated with IoT, endpoints, and cloud resources.