ZTNA Recommendations for IT, Security, and Risk Management Leaders

  • Begin deployment by applying specific policies to user groups to control access to resources.
  • Document application resource usage prior to starting a ZTNA implementation, then map users to resources within RevBits ZTN.
  • Clean up access privileges by blocking employee and third-party access for those no longer associated with the organization.
  • Managing resource access policies is an ongoing and iterative process, thus as business requirements change, resource access policies should too.
  • Inventory all VPN instances that allow network access and replace them over time.
  • Include unmanaged device access with the ZTNA architecture.
  • Define policies to combine user attributes to enforce who has access to what.
  • Develop a strategy to address heterogeneous workloads spanning on-premises, hybrid, virtual, and container environments.

--

--

RevBits gives every enterprise the power to secure their systems. Protect against them with RevBits comprehensive Cybersecurity Intelligence Platform.

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
RevBits

RevBits

2 Followers

RevBits gives every enterprise the power to secure their systems. Protect against them with RevBits comprehensive Cybersecurity Intelligence Platform.