Information Technology Question

User Generated

Fvepbaaf

Engineering

IT591

Purdue Global University

Description

Unformatted Attachment Preview

Unit 4 Assignment Unit 4 Assignment: CISA’s Zero Trust Maturity Model Outcomes addressed in this activity: Unit Outcomes: • • • Define cyber security standards, frameworks, and regulations in several industries. Discuss the historical evolution of cyber security standards and regulations in several industries. Analyze the compliance criteria for several industry cyber security standards and regulations. Course Outcome: IT591-2: Assess cyber security industry standards, compliance, regulations, and laws. Purpose Regulations, standards, and frameworks are complex. Doing a deep dive into one of those standards, Zero Trust will allow you to learn how to read a standard thoroughly and what elements of the standard are essential, as well as how to locate those elements within the written standard. You will also evaluate the effectiveness of a standard, providing supporting examples. Assignment Instructions Use the materials from your reading, particularly the material specific to CISA’s Zero Trust Model and NIST 80-207 Zero Trust Architecture. In addition, research the Internet to provide the required responses. Provide an in-depth explanation of the following about the Zero Trust model and framework: 1. Explain the events that led to the development of the Zero Trust Model. 2. Explain the goals that the model seeks to achieve. 3. Provide an overview of the IT and Cybersecurity departments’ role in achieving Zero Trust. 4. Explain how audits and assessments help achieve or measure compliance. 5. What is required to comply with NIST 800-207? 6. What challenges exist when moving to the Zero Trust Model? 7. Assess the value of the Zero Trust Model as organizations move to cloud-based assets, remote workers, and Bring Your Own Device (BYOD) environments. 8. Conclusion Assignment Requirements • • • • • • 4–5 pages of content (exclusive of cover sheet and references page), using Times New Roman font style, 12 point, double-spaced, using correct APA formatting, and include a cover sheet, table of contents, abstract, and reference page(s) At least 1 credible source cited and referenced No more than 1 table or figure No spelling errors No grammar errors No APA errors For more information on APA formatting and citation style, refer to the resources in the Academic Tools area of this course. Also review the university policy on plagiarism. If you have any questions, please contact your professor. Directions for Submitting Your Assignment Name your assignment document according to this convention: YourLastName_IT591_Unit4. Submit your completed assignment to the Unit 4 Dropbox by the deadline.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

1

CISA’s Zero Trust Maturity Model: In-Depth Analysis

Author name
Institutional affiliation
Course number and name
Instructor name
Assignment due date

2
CISA’s Zero Trust Maturity Model: In-Depth Analysis
Events Leading to the Development of the Zero Trust Model
The Model was designed to address the new generation of cyber threats and some of the
drawbacks of earlier security frameworks. Classically, to protect the network from threats,
several barriers like firewalls and VPNs were used to safeguard the internal user and systems,
which it was presumed could be relied on (National Institute of Standards and Technology
2020). However, several events and a trend pointed to the shortcomings of this approach. The
evolution of APTs, which may be conducted by state-sponsored actors or significant and
coordinated cyber-criminal gangs showed that even the most basic access defenses could be
penetrated and that attackers could exist unaware in trusted environments. Insider threat, as
demonstrated by malicious insiders or stolen credentials, vividly showed that internal actors
should not be assumed harmless.
Furthermore, using remote work and personal devices further weakened the clear network
perimeters that more traditional perimeter security could address. Recent cyberattacks like the
SolarWinds attack and OPM data breach brought to the fore the risk in trusted networks and
wrong assumptions that were characteristic of previous years (Muhammad et al., 2022). In record
to these challenges, the principle of Zero Trust was first established by Forrester Research in
2010. This occurred with the relea...

Similar Content

Related Tags