In this domain, applications are installed locally on a laptop, server, workstation, or mobile device. Protecting these applications involves security software installed locally on the devices.
The Zero Trust Health Check examines key aspects such as:
- Coverage: Are all devices that run software currently running your security software?
- Hardening: Are all the applications that are capable of running on the Endpoints trusted?
- Authenticated: Are the people who use the devices verified by strong multi-factor authentication?
- Threat Detection: Are local threats like Ransomware detected when run?
- Threat Response: Do local threats, once detected, remove access to the device?
In this domain, applications are inside company-run data centers, such as a cloud provider, office facility, or colocation provider. In this scenario, we require network visibility around the device.
The Zero Trust Health Check examines key aspects such as:
- Coverage: Are there network filters between your hosted networked apps and the endpoints?
- Hardening: Are there policies to group which devices are permitted to access networked applications?
- Authenticated: Are there policies to group which users are permitted to access networked applications?
- Threat Detection: Are network threats like MITRE techniques detected when run?
- Threat Response: Do network threats, once detected, remove access to the device?
In this domain, applications are managed by a 3rd party Software as a Service provider such as Microsoft 365 (Teams, SharePoint or OneDrive). In this scenario we require visibility into the network, endpoint and identities in use by the SaaS product with Enforcement.
The Zero Trust Health Check examines key aspects such as:
- Coverage: Are all cloud applications in use by devices monitored regardless of location?
- Hardening: Are there policies only allowing trusted SaaS applications?
- Authenticated: Are users verified by strong multi-factor authentication?
- Threat Detection: Are threats like Account Takeovers detected?
- Threat Response: When threats are detected, is access removed?