admin 管理员组文章数量: 1086019
2024年12月29日发(作者:redhat收费模式)
SOLUTION BRIEF
Zero-Trust Access for Comprehensive
Visibility and Control
Executive Summary
Zero-Trust Access (ZTA) solutions exist for nearly every part of the network.
However, a piecemeal approach to ZTA control leaves security gaps and is costly
and cumbersome to manage.
The Fortinet Zero-Trust Access (ZTA) framework leverages a tightly integrated
collection of security solutions that enable organizations to identify and classify
all users and devices seeking network access, assess their state of compliance
with internal security policies, automatically assign them to zones of control, and
continuously monitor them, both on and off the network.
Components of the
Fortinet Zero-Trust
Access Control Framework
nn
FortiAuthenticator user identity
management server
nn
FortiToken two-factor
authentication token
nn
FortiNAC network access control
nn
FortiClient advanced endpoint
Introduction
telemetry
“Zero trust” has become a buzzword in recent years, adopted by many different
technology vendors. ZTA is an important pillar of an overall platform strategy that
combines ZTA with security-driven networking, dynamic cloud security, and artificial
intelligence (AI)-driven security operations. When organizations permit access under ZTA constraints, they confine users to the resources
that are necessary for their role only. ZTA also stipulates the identification, monitoring, and control of networked devices, which are often
more numerous than users.
With decades of experience in helping enterprises maintain security coverage for their rapidly expanding networks, Fortinet offers a
highly effective ZTA framework that delivers visibility and control in three key areas: users on the network, devices on the network, and
those users’ and devices’ offline activities.
Effective and Practical Identity and Access Management
Both legitimate network users and bad actors command the CISO’s attention, whether they are driving business success or jeopardizing
it. For this reason, user identity management is a cornerstone of the Fortinet Security Fabric. Organizations can achieve complete user
visibility and effective access policy enforcement with the Identity and Access Management (IAM) portion of the ZTA framework:
nn
FortiAuthenticator serves as the hub of authentication, authorization, and accounting (AAA); access management; single sign-
on (SSO); and guest management services. It establishes user identity through logins, certificates, and/or multi-factor inputs.
FortiAuthenticator shares these inputs with role-based access control (RBAC) services to match an authenticated user to specific
access rights and services. FortiAuthenticator also supports Security Assertion Markup Language (SAML) implementations, enabling
users to securely access Software-as-a-Service (SaaS) solutions such as Salesforce, ADP, or Microsoft 365.
nn
FortiToken provides two-factor authentication services to FortiAuthenticator, either through a hardware token or as a mobile solution.
The mobile solution is an open authorization (OAuth)-compliant one-time password (OTP) generator application for Android and
iOS devices that supports both time-based and event-based tokens. The zero-footprint solution makes it easy to scale multi-factor
authentication implementations across the enterprise.
Whether the organization has a Fortinet Security Fabric in place or another security infrastructure, Fortinet ZTA solutions for user identity
and access management provide robust security for the Fortinet Security Fabric.
1
SOLUTION BRIEF | Zero-Trust Access for Comprehensive Visibility and Control
Zone-of-control assignment
FortiNAC can deliver dynamic network microsegmentation in a mixed
vendor environment, supporting more than 170 different vendors
and 2,400 different devices and interacting with the network to keep
devices in the proper network segment.
FortiNAC also integrates with FortiGate NGFWs to enable intent-
based segmentation. This is an approach to segmentation based
on business objectives, such as compliance with data privacy laws
such as the General Data Protection Regulation (GDPR) or Payment
Card Industry Data Security Standard (PCI DSS) transaction
protection. With intent-based segmentation in place, security
teams can tag assets with compliance restrictions, which FortiGate
enforces, regardless of where the assets move in the network,
helping to reduce the time and cost of compliance implementation.
Organizations may also use intent-based segmentation to
maintain internal access policies when they restructure the
business, without having to reconfigure the network itself.
Continuous monitoring
ZTA assumes that trust is transient; a device may be certified as
trusted and then subsequently infected. Also, the applications it runs
may become compromised. To maintain up-to-date trust statuses for
all devices on the network, FortiNAC provides ongoing monitoring,
with real-time incident response. Once it detects abnormal device
behavior, FortiNAC can take a variety of countermeasures, such as
reassigning the device to a quarantine zone so that compromised
devices cannot serve as a staging ground for threat infiltration or
data exfiltration, or put devices in a remediation network segment
for the user to address whatever issue has been detected.
Figure 1: A typical Fortinet ZTA user identity and access management implementation.
Security for All the Things
The second objective of the Fortinet Zero-Trust Access solution
is to maintain continuous visibility and access control of all
devices on the network. This has been a considerable pain point
for organizations. The growth in network device footprints is far
outpacing the growth in network users—and certainly that of
security teams. To help relieve those teams, Fortinet ZTA solutions
provide integrated and automated discovery, classification,
segmentation, and incident response.
Automated discovery and classification
The FortiNAC network access control solution accurately discovers
and identifies every device on, or seeking access to, the network;
scans it to ensure that it is not already compromised; and classifies
it by role and function. FortiNAC can leverage existing agents to
retrieve device information, but many organizations may not want to
have to install agents at every location, in which case FortiNAC can
communicate with the network initially, and then later identify devices.
Protecting Assets on and off the Network
For end-user devices, such as laptops and mobile phones, Fortinet
extends ZTA control to both on- and off-network operation through
FortiClient.
Secure remote access
To enable secure remote access, FortiClient provides flexible
options for VPN connectivity. It supports both secure sockets
layer (SSL) and Internet Protocol security (IPsec) VPNs. A split
tunneling feature enables remote users on SSL VPNs to access
the internet without their traffic having to pass through the
corporate VPN headend, as in a typical SSL tunnel. This reduces
latency, which improves user experience. At the same time,
FortiClient includes protections to ensure that internet-based
transactions cannot backflow into the VPN connection and
jeopardize the corporate network.
Figure 2: Supporting agentless data collection, FortiNAC provides extensive
visibility into everything on the network.
2
SOLUTION BRIEF | Zero-Trust Access for Comprehensive Visibility and Control
Figure 3: FortiClient ensures endpoint visibility and compliance throughout the Security Fabric. It also shares endpoint telemetry with the Security Fabric, enabling unified endpoint awareness.
Endpoint visibility
When end-user devices reconnect with the enterprise network, the FortiClient Fabric
Agent shares endpoint security telemetry data—device operating system (OS) and
applications, known vulnerabilities, patches, and security status—with FortiGate NGFWs
and the rest of the Fortinet Security Fabric. This data helps the Fortinet ZTA tools refine the
access rules for the devices.
Key Benefits of the
Fortinet ZTA Framework
nn
Complete and continuous control
over who is on the network
nn
Complete and continuous control
Conclusion
The key to successfully implementing ZTA is to balance security and accessibility, since
locking down the network is rarely an option. Fortinet ZTA solutions make it easier to
accurately discover all the devices and users accessing the network and manage the
associated security risks of each. This puts CISOs in a better position to support digital
innovation (DI) initiatives that expand network access and leverage new network-connected
technologies. Zero trust needs to be more than a buzzword or a talking point. With the right
solution, it delivers true business value.
over what is on the network
nn
Integrated ZTA solution for the
Fortinet Security Fabric that
works equally on wired and
wireless networks
nn
A complete, integrated solution
coming from one vendor
Copyright © 2020 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law
trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other
results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied,
except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in
such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal
lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this
publication without notice, and the most current version of the publication shall be applicable.
September 24, 2020 8:09 PM
693461-A-0-EN
D:FortinetWork2020September092420sb-FA-zero-trust-network-access-for-comprehensive-visibility-and-control-6192020sb-FA-zero-trust-access-for-comprehensive-visibility-and-control_092420
版权声明:本文标题:Fortinet Zero-Trust Access控制框架简介说明书 内容由网友自发贡献,该文观点仅代表作者本人, 转载请联系作者并注明出处:http://www.roclinux.cn/p/1735527635a1673910.html, 本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌抄袭侵权/违法违规的内容,一经查实,本站将立刻删除。
发表评论