We’ve been building a robust policy framework for Zero Trust, starting with enterprise-wide policy development (Activity 6.1.1) and then defining specific access profile rules at the Component level (Activity 6.1.2). Now, we take these individual blueprints and integrate them into a single, cohesive, and enforceable standard for the entire enterprise. This brings us to Zero Trust Activity 6.1.3: Enterprise Security Profile Pt1.

This activity represents a crucial step in operationalizing Zero Trust at scale, ensuring consistent policy enforcement across all organizational components. It mandates that Enterprise security profile rules are developed to cover the User, Data, Network & Environment, and Device pillars initially. This means the enterprise-level profile defines access based on attributes from all foundational pillars. It also requires that existing Component security profile rules are integrated into this Enterprise profile, initially focusing on non-mission/task critical DAAS access through an iterative tuning approach. Furthermore, a key outcome is that the service catalog and/or CMDB exists with Zero Trust components inventoried, specifically detailing Policy Decision Points (PDPs), Policy Enforcement Points (PEPs), and Policy Information Points (PIPs).

This activity is vital for eliminating policy fragmentation and ensuring a unified approach to access control. It transforms individual Component policies into a harmonious, enterprise-wide security posture.

The outcomes for Activity 6.1.3 Part 1 highlight the creation and integration of this unified profile:

  1. Enterprise profile rules are created to access DAAS using capabilities from User, Data, Network & Environment, and Device pillars.
  2. Component profile rules are integrated with the Enterprise profile rules using a standardized approach.
  3. Service catalog and/or CMDB exists with ZT components; at a minimum PDP(s), PEP(s), and PIP(s) details inventoried.

The ultimate end state underscores the strategic impact of this unified approach: The patterns of behavior are established for necessary outcomes of access control at the Enterprise level. This means precise, enterprise-wide blueprints for access based on identity and context.

Solutions for Achieving Enterprise Security Profile Pt1

Implementing Activity 6.1.3 requires a strong governance model, robust policy management capabilities, and accurate inventory of your Zero Trust architecture components, heavily relying on the synergy between your core identity and network access solutions.

  1. Developing Enterprise Security Profile Rules:
    1. Process: The Enterprise, in close collaboration with Component stakeholders, consolidates the Component-level access profile rules (from Activity 6.1.2) and refines them into a set of unified Enterprise security profile rules. This involves standardizing attribute definitions, access criteria, and policy structure across all four initial pillars (User, Data, Network & Environment, Device).
    2. Iterative Tuning: For non-mission/task critical DAAS access, implement an iterative approach to tuning these integrated policies, allowing for adjustments and optimizations based on testing and feedback before broader rollout.
  2. Integrating Component Profile Rules:
    1. Standardized Approach: Establish a clear, standardized process for how Component-specific access profile rules are submitted, reviewed, approved, and integrated into the overarching Enterprise security profile. This ensures consistency and prevents fragmentation.
    2. Attribute Mapping: Map Component-specific attributes to the Enterprise’s standardized set of attributes (from Activity 1.2.1) to ensure interoperability of policies.
  3. Inventorying Zero Trust Components in CMDB/Service Catalog:
    1. Process: Actively identify and document all deployed or planned Zero Trust architectural components, specifically Policy Decision Points (PDPs), Policy Enforcement Points (PEPs), and Policy Information Points (PIPs).
    2. Centralized Repository: Ensure details about these ZT components (e.g., location, function, owner, integration points, API specifications, and the policies they enforce/consume) are formally inventoried within your enterprise’s Configuration Management Database (CMDB) or Service Catalog. This provides a single source of truth for your Zero Trust infrastructure.
  4. Leveraging Attribute Sources from All Pillars (with Okta and Zscaler):
    1. The Enterprise security profile rules are fundamentally attribute-based. Ensure seamless integration with authoritative sources from all pillars to derive these attributes in real-time for policy evaluation:
      1. User (Okta’s Role): Your Okta identity platform serves as the authoritative source for user and Non-Person Entity (NPE) identities and their rich attributes (roles, groups, security clearances). These are the foundational “who” elements of your access policies.
      2. Device (Zscaler’s Role, informed by others): Zscaler’s Zero Trust Exchange collects critical device context (managed status, posture, location) for remote and internal access. While Trellix EDR provides the raw device health data, Zscaler’s platform consumes and normalizes this for policy decisions.
      3. Data: Data classification and tagging systems (e.g., Trellix DLP) provide data sensitivity labels that are crucial for DAAS access policies.
      4. Network & Environment (Zscaler’s Role): Zscaler provides real-time network context, including user/device location, network segment, and the specific application being accessed, enabling policy enforcement based on these network conditions.

How Okta and Zscaler Work Together to Achieve Desired Outcomes:

The synergy between Okta and Zscaler is absolutely central to operationalizing the Enterprise Security Profile defined in Activity 6.1.3, particularly for enforcing access control based on identity and context:

  • Okta: The Authoritative Identity Source (PDP for Identity Context)
    • Provides Core “Who” Attributes: Okta serves as the single source of truth for user and NPE identities, their roles, groups, and all other relevant attributes. These attributes are directly consumed by policy engines (including Zscaler’s) to determine “who” is attempting access.
    • Enables Consistent Identity-Based Policies: By centralizing identity, Okta ensures that any policy leveraging user attributes (a core component of the Enterprise Security Profile) is consistently applied across all access requests.
  • Zscaler: The Contextual Policy Enforcement Point (PEP, PDP for Device/Network Context)
    • Consumes Okta Identity: Zscaler’s Zero Trust Exchange integrates seamlessly with Okta. When a user or NPE attempts to access a resource (like DAAS), Zscaler first authenticates the user/NPE via Okta, retrieving their verified identity and attributes.
    • Gathers Device & Network Context: Zscaler’s platform (e.g., via its Zscaler Client Connector, or integration with UEM/EDR like Trellix) gathers real-time device posture and network context (e.g., location, managed status, compliance, threat indicators).
    • Applies Enterprise Security Profile: With the user’s identity (from Okta) and the device/network context (from its own sensors/integrations), Zscaler becomes a primary Policy Enforcement Point (PEP). It evaluates the Enterprise Security Profile rules defined in Activity 6.1.3 in real-time. This allows it to dynamically enforce complex RBAC/ABAC and condition-based access controls for users and devices accessing applications and data.
    • Creates Logical Network Zones: Zscaler’s architecture itself helps create logical network zones, enforcing policy-based access between users/devices and specific application segments without reliance on traditional network segmentation, which aligns with the “Network & Environment” pillar.
  • The Combined Synergy: Okta provides Zscaler with the authoritative “who.” Zscaler then combines this with the “what device,” “where,” and “under what conditions” data, and applies the combined Enterprise Security Profile rules. This powerful partnership operationalizes the granular, identity- and context-aware access control mandated by Activity 6.1.3, ensuring that every access decision aligns with the enterprise’s unified Zero Trust blueprint.

Key Items to Consider:

  • Consensus Building for Enterprise Profile: Unifying policies across diverse Components requires significant governance, collaboration, and consensus-building efforts.
  • CMDB Accuracy for ZT Components: The accuracy and completeness of your CMDB/Service Catalog regarding ZT components (PDPs, PEPs, PIPs) are vital for managing the policy enforcement fabric.
  • Iterative Tuning: The iterative tuning for non-mission/task critical DAAS is a smart strategy to refine policies before applying them to more sensitive areas.
  • Automation Enablement: Design policies with automation in mind, ensuring they can be translated into machine-readable formats and enforced by automated systems.
  • Visibility into Policy Enforcement: Ensure that logs from PDPs, PEPs, and PIPs are fed into your SIEM for monitoring policy effectiveness and detecting violations.

For the Technical Buyer

Activity 6.1.3 is your directive to consolidate disparate access controls into a unified, enterprise-wide Zero Trust security profile. It’s about taking Component-level policy definitions and integrating them into a standardized blueprint that spans User, Data, Network & Environment, and Device pillars. For technical buyers, success here means driving the creation of these Enterprise profile rules, ensuring seamless integration of Component policies, and meticulously inventorying your PDPs, PEPs, and PIPs in your CMDB. Leveraging your Okta identity platform for the authoritative “who” and Zscaler for the context-aware “what device, where, and how” and its policy enforcement capabilities, you build a cohesive fabric where access decisions are made consistently and dynamically across your entire digital estate, based on a single, enterprise-defined security profile. Pillar: Automation and Orchestration
Capability: 6.1 Policy Decision & Enforcement Framework
Activity: 6.1.3 Enterprise Security Profile Part 1
Phase: Target Level
Predecessor(s): 6.1.2 Organization Access Profile
Successor(s): 6.1.4 Enterprise Security Profile Pt2

Technology Partners