Use Case A: Discovery and Identification of IDs, Assets, and Data Flows#

Note

This page is supplementary material for the NIST SP 1800-35 publication.

NIST SP 800-207 discusses the discovery and cataloging of all enterprise IDs, assets, and data flows as the initial step before migrating to a ZTA. An enterprise needs to identify and understand the workflows used in business processes, the IDs used, and the resources involved. Then it can move on to creating policies around those workflows. This use case covers this initial exercise.

The following discovery use cases did not originally appear in the Project Description but were subsequently included to reflect the full ZTA migration process described in NIST SP 800-207.

Scenario A-1: Discovery and authentication of endpoint assets#

Discovery here is focused on detecting assets and flows on the network, mapping them to identified assets and flows, and providing access accordingly.

Pre-Condition: Enterprise-owned components (RSS and EP) have already undergone initial onboarding for the enterprise, and BYODs have already registered with the enterprise. Any necessary agents, certificates, etc. have been installed. Non-onboarded enterprise-owned components as well as non-registered BYODs are treated the same as unknown guest devices. BYOD devices must have a software agent installed that allows inspection of the devices to create a report of the device hygiene (e.g., look for accepted virus scanner and approved operating system [OS]). The enterprise infrastructure is a macrosegmented local network with an “enterprise” segment with resources that can only be accessed by authorized Enterprise-IDs and a “guest” segment with access to the public internet only.

Demonstration: Connect the device to the network and demonstrate network connectivity.

Purpose and Outcome: This scenario demonstrates the capability to authenticate assets at a specific location and provide enterprise network access. The enterprise endpoint management system should be able to differentiate between enterprise-owned and non-owned endpoints and place devices on the correct network segment.

Table 1 - Scenario A-1 Demonstrations

Demo ID

Subj Type

Onboarded/Registered

Auth Stat

Compl

Subj Loc

Desired Outcome

A-1.1

a

RSS

Y

A+

Y

On-Prem

Access to Network

b

RSS

Y

A+

N

On-Prem

No Access to Network

c

RSS

Y

A-

On-Prem

No Access to Network

d

RSS

N

On-Prem

No Access to Network

e

EP

Y

A+

Y

On-Prem

Access to Network

f

EP

Y

A+

N

On-Prem

Max. Limited Access to Network

g

EP

Y

A-

On-Prem

No Access to Network

h

EP

N

On-Prem

Access to Public Network

i

BYOD

Y

A+

Y

On-Prem

Access to Network

j

BYOD

Y

A+

N

On-Prem

Limited Access to Network

k

BYOD

Y

A-

On-Prem

No Access to Network

l

BYOD

N

On-Prem

Access to Public Network

m

Guest Dev.

On-Prem

Access to Public Network

A-1.2

a

RSS

Y

A+

Y

Branch

Access to Network

b

RSS

Y

A+

N

Branch

No Access to Network

c

RSS

Y

A-

Branch

No Access to Network

d

RSS

N

Branch

No Access to Network

e

EP

Y

A+

Y

Branch

Access to Network

f

EP

Y

A+

N

Branch

Limited Access to Network

g

EP

Y

A-

Branch

No Access to Network

h

EP

N

Branch

Access to Public Network

i

BYOD

Y

A+

Y

Branch

Access to Network

j

BYOD

Y

A+

N

Branch

Limited Access to Network

k

BYOD

Y

A-

Branch

No Access to Network

l

BYOD

N

Branch

Access to Public Network

m

Guest Dev.

Branch

Access to Public Network

A-1.3

a

EP

Y

A+

Y

Remote

Access to Network

b

EP

Y

A+

N

Remote

Max. Limited Access to Network

c

EP

Y

A-

Remote

No Access to Network

d

BYOD

Y

A+

Y

Remote

Access to Network

e

BYOD

Y

A+

N

Remote

Max. Limited Access to Network

f

BYOD

Y

A-

Remote

No Access to Network

A-1.4

a

RSS

Y

A+

Y

Cloud

Access to Network

b

RSS

Y

A+

N

Cloud

No Access to Network

c

RSS

Y

A-

Cloud

No Access to Network

d

RSS

N

Cloud

No Access to Network

e

EP

Y

A+

Y

Cloud

Access to Network

f

EP

Y

A+

N

Cloud

Max. Limited Access to Network

g

EP

Y

A-

Cloud

No Access to Network

Scenario A-2: Reauthentication of identified assets#

Once an asset is identified and authenticated, continuous re-authentication is necessary.

Pre-Condition: The asset (user endpoint, resource) underwent previous authentication and is ready for operation.

Demonstration: The asset is reauthenticated and will either pass or fail reauthentication.

Purpose and Outcome: This scenario demonstrates the proper reauthentication of an asset and performs the desired action accordingly.

Table 2 - Scenario A-2 Demonstrations

Demo ID

Subj Type

Onboarded/Registered

Auth Stat

Compl

Subj Loc

Desired Outcome

A-2.1

a

RSS

Y

RA+

Y

On-Prem

Keep Access to Network

A-2.1

b

RSS

Y

RA+

N

On-Prem

Terminate Access to Network

A-2.1

c

RSS

Y

RA-

On-Prem

Terminate Access to Network

A-2.1

d

EP

Y

RA+

Y

On-Prem

Keep Access to Network

A-2.1

e

EP

Y

RA+

N

On-Prem

Max. Limited Access to Network

A-2.1

f

EP

Y

RA-

On-Prem

Terminate Access to Network

A-2.1

g

BYOD

Y

RA+

Y

On-Prem

Keep Access to Network

A-2.1

h

BYOD

Y

RA+

N

On-Prem

Max. Limited Access to Network

A-2.1

i

BYOD

Y

RA-

On-Prem

Terminate Access to Network

A-2.2

a

RSS

Y

RA+

Y

Branch

Keep Access to Network

A-2.2

b

RSS

Y

RA+

N

Branch

Terminate Access to Network

A-2.2

c

RSS

Y

RA-

Branch

Terminate Access to Network

A-2.2

d

EP

Y

RA+

Y

Branch

Keep Access to Network

A-2.2

e

EP

Y

RA+

N

Branch

Max. Limited Access to Network

A-2.2

f

EP

Y

RA-

Branch

Terminate Access to Network

A-2.2

g

BYOD

Y

RA+

Y

Branch

Keep Access to Network

A-2.2

h

BYOD

Y

RA+

N

Branch

Max. Limited Access to Network

A-2.2

i

BYOD

Y

RA-

Branch

Terminate Access to Network

A-2.3

a

EP

Y

RA+

Y

Remote

Keep Access to Network

A-2.3

b

EP

Y

RA+

N

Remote

Max. Limited Access to Network

A-2.3

c

EP

Y

RA-

Remote

Terminate Access to Network

A-2.3

d

BYOD

Y

RA+

Y

Remote

Keep Access to Network

A-2.3

e

BYOD

Y

RA+

N

Remote

Max. Limited Access to Network

A-2.3

f

BYOD

Y

RA-

Remote

Terminate Access to Network

A-2.4

a

RSS

Y

RA+

Y

Cloud

Keep Access to Network

A-2.4

b

RSS

Y

RA+

N

Cloud

Terminate Access to Network

A-2.4

c

RSS

Y

RA-

Cloud

Terminate Access to Network

A-2.4

d

EP

Y

RA+

Y

Cloud

Keep Access to Network

A-2.4

e

EP

Y

RA+

N

Cloud

Max. Limited Access to Network

A-2.4

f

EP

Y

RA-

Cloud

Terminate Access to Network

Scenario A-3: Discovery of transaction flows#

This scenario demonstrates the monitoring of transactions between endpoints. Transactions include user access to a resource or service-to-service communication.

Pre-Condition: User (Enterprise-ID or Other-ID) has a set of privileges to a resource and can successfully authenticate. Requesting endpoints are considered successfully authenticated. Some mechanism is present either on the endpoints or along the communication path that can observe and log actions.

Demonstration: Logs are produced that map user access requests, API calls, etc. between resources. The logs may be on a third resource.

Purpose and Outcome: This scenario demonstrates the discovery and recording of metadata of traffic flows between resources and user access requests/actions. The actual inspection of traffic (e.g., inspection of data) is not necessary.

Table 3 - Scenario A-3 Demonstrations

Demo ID

Endpoint Type

Req Loc

RSS Loc

Desired Outcome

A-3.1

a

USER

On-Prem

On-Prem

User request and action is recorded

A-3.1

b

RSS/Service

On-Prem

On-Prem

API call is recorded

A-3.2

a

USER

On-Prem

Cloud

User request and action is recorded

A-3.2

b

RSS/Service

On-Prem

Cloud

API call is recorded

A-3.3

a

USER

Branch

On-Prem

User request and action is recorded

A-3.3

b

RSS/Service

Branch

On-Prem

API call is recorded

A-3.4

a

USER

Branch

Cloud

User request and action is recorded

A-3.4

b

RSS/Service

Branch

Cloud

API call is recorded

A-3.5

a

USER

Remote

On-Prem

User request and action is recorded

A-3.6

a

USER

Remote

Cloud

User request and action is recorded