Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Palo Alto Networks Zero Trust Maturity Model

As with any strategic initiative, it’s important to benchmark where you are as you begin your Zero Trust journey. It’s also important to measure your maturity as you improve your Zero Trust
environment over time. Designed using the Capability Maturity Model, the Zero Trust Maturity Model mirrors the five-step methodology for implementing Zero Trust and should be used to
measure the maturity of a single protect surface.
The below legend details the various stages in the Maturity Model as it applies to each step in the 5-step methodology. On the second page, circle the number that aligns to the appropriate
maturity stage for each of the 5-steps. As your Zero Trust environment evolves, continue to reevaluate your protect surfaces so you can identify the progress that has been made as well as
what needs to be done to reach full maturity.

STEP INITIAL (1 pt.) REPEATABLE (2 pts.) DEFINED (3 pts.) MANAGED (4 pts.) OPTIMIZED (5 pts.)

1. Define Your Protect Surface Discovery is done manually. Application and user Team is trained on how to Immediate visibility into newly Discovery and classification
Only a small percentage identification capabilities classify data as it is used. online DAAS elements (includ- are fully automated.
Determine which single DAAS element will be placed
of DAAS is discovered and are starting to be used. This Processes are introduced to ing updates to existing DAAS
inside of your protect surface.
classified. includes automated tools and continuously mature protect elements) is established, and
pilot projects with those tools surface discovery. DAAS elements are automati-
to discover and classify data. cally classified into the correct
or new protect surface.

2. Map the Transaction Flows Flows are conceptualized Traditional scanning tools are Flows are validated with Visibility into what goes in Transaction flows are
only based on what is already used. system owners. and out of the system is automatically mapped across
Map transaction flows based on how the DAAS
known. maintained. all locations.
element identified in Step 1 interact to understand
the interdependencies between the sensitive data,
application infrastructure (i.e. web, application, and
database servers), network services, and users.

3. Architect a Zero Trust Environment With little visibility and an The protect surface is The basics of protect surface Additional controls are added Controls are enforced using a
undefined protect surface, established based on current enforcement are complete, to evaluate multiple variables combination of hardware and
Build a Zero Trust architecture to leverage network
the architecture cannot be resources and priorities. including placing segmentation (i.e., endpoint controls, SAAS software capabilities.
segmentation, enable granular access to sensitive
properly designed. gateways in the appropriate and API controls).
data, and provide robust Layer 7 policy enforcement
places.
for threat prevention.

4. Create Zero Trust Policy Policy is written at Layer 3. Additional “who” statements Team works with the business Custom user-specific elements Layer 7 policy is written for
are identified to address to determine who or what defined by policy are created, granular enforcement. Only
Create Zero Trust policy following the Kipling Method:
business needs. User-IDs of should have access to the reducing policy space and the known allowed traffic or
Who, What, When, Where, Why, and How.
applications and resources are protect surface. number of users with access. legitimate application commu-
known, but access rights are nication are permitted.
unknown.

5. Monitor and Maintain Visibility into what’s happen- A traditional SIEM or log Telemetry is gathered from all Machine learning tools are Data is incorporated from
ing on the network is low. repositories are available, controls and sent to a central applied to the data lake for multiple sources and used to
Analyze telemetry from the network, endpoint,
but processes are still highly data lake. context into how traffic is used refine Steps 1–4. Alerts and
and cloud while leveraging machine learning and
manual. in the environment. analysis are automated.
behavioral analytics to provide greater insight into
your Zero Trust environment and allow you to quickly
adapt and respond.

Palo Alto Networks | Zero Trust Maturity Model | Workbook 1


Palo Alto Networks Zero Trust Maturity Model
Name of Protect Surface
Circle the number that aligns to the appropriate
DAAS Element Protected
maturity stage for each of the 5-steps.

STEP INITIAL (1 pt.) REPEATABLE (2 pts.) DEFINED (3 pts.) MANAGED (4 pts.) OPTIMIZED (5 pts.)

1. Define Your Protect Surface


Determine which single DAAS element will be placed
inside of your protect surface.
1 2 3 4 5
2. Map the Transaction Flows

1 2 3 4 5
Map transaction flows based on how the DAAS
element identified in Step 1 interact to understand
the interdependencies between the sensitive data,
application infrastructure (i.e. web, application, and
database servers), network services, and users.

3. Architect a Zero Trust Environment

1 2 3 4 5
Build a Zero Trust architecture to leverage network
segmentation, enable granular access to sensitive
data, and provide robust Layer 7 policy enforcement
for threat prevention.

4. Create Zero Trust Policy


Create Zero Trust policy following the Kipling Method:
Who, What, When, Where, Why, and How.
1 2 3 4 5
5. Monitor and Maintain

1 2 3 4 5
Analyze telemetry from the network, endpoint,
and cloud while leveraging machine learning and
behavioral analytics to provide greater insight into
your Zero Trust environment and allow you to quickly
adapt and respond.

TOTAL SCORE: ______ / 25 PTS.

Palo Alto Networks | Zero Trust Maturity Model | Workbook 2

You might also like