Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1984,"date":"2023-12-15T18:51:13","date_gmt":"2023-12-15T18:51:13","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/"},"modified":"2023-12-15T18:51:13","modified_gmt":"2023-12-15T18:51:13","slug":"secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/","title":{"rendered":"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm"},"content":{"rendered":"

You hear a lot about zero trust microsegmentation these days and rightly so. It has matured into a proven security best-practice to effectively prevent unauthorized lateral movement across network\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

You hear a lot about zero trust microsegmentation these days and rightly so. It has matured into a proven security best-practice to effectively prevent unauthorized lateral movement across network resources. It involves dividing your network into isolated segments, or \u201cmicrosegments,\u201d where each segment has its own set of security policies and controls. In this way, even if a breach occurs or a potential threat gains access to a resource, the blast radius is contained.<\/p>\n

And like many security practices, there are different ways to achieve the objective, and typically much of it depends on the unique customer environment. For microsegmentation, the key is to have a trusted partner that not only provides a robust security solution but gives you the flexibility to adapt to your needs instead of forcing a \u201cone size fits all\u201d approach.<\/p>\n

Now, there are broadly two different approaches you can take to achieve your microsegmentation objectives:<\/p>\n

A host-based enforcement approach where the policies are enforced on the workload itself. This can be done by installing an agent on the workload or by leveraging APIs in public cloud.
\nA network-based enforcement approach where the policies are enforced on a network device like an east-west network firewall or a switch.<\/p>\n

While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the workloads, it may not always be a pragmatic approach for a myriad of reasons. These reasons can range from application team perceptions, network security team preferences, or simply the need for a different approach to achieve buy-in across the organization.<\/p>\n

Long story short, to make microsegmentation practical and achievable, it\u2019s clear that a dynamic duo of host and network-based security is key to a robust and resilient zero trust cybersecurity strategy. Earlier this year, Cisco completed the native integration between Cisco Secure Workload and Cisco Secure Firewall delivering on this principle and providing customers with unmatched flexibility as well as defense in depth. Let\u2019s take a deeper look at what this integration enables our customers to achieve and some of the use cases.<\/p>\n

Use case #1: Network visibility via an east-west network firewall<\/strong><\/h2>\n

The journey to microsegmentation starts with visibility. This is a perfect opportunity for me to insert the clich\u00e9 here \u2013 \u201cWhat you can\u2019t see, you can\u2019t protect.\u201d In the context of microsegmentation, flow visibility provides the foundation for building a blueprint of how applications communicate with each other, as well as users and devices \u2013 both within and outside the datacenter.<\/p>\n

The integration between Secure Workload and Secure Firewall enables the ingestion of NSEL flow records to provide network flow visibility, as shown in Figure 1. You can further enrich this network flow data by bringing in context in the form of labels and tags from external systems like CMDB, IPAM, identity sources, etc. This contextually enriched data set allows you to quickly identify the communication patterns and any indicators of compromise across your application landscape, enabling you to immediately improve your security posture.<\/p>\n

Figure 1: Secure Workload ingests NSEL flow records from Secure Firewall<\/strong><\/p>\n\n

Use case #2: Microsegmentation using the east-west network firewall<\/strong><\/h2>\n

The integration of Secure Firewall and Secure Workload provides two powerful complimentary methods to discover, compile, and enforce zero trust microsegmentation policies. The ability to use a host-based, network-based, or mix of the two methods gives you the flexibility to deploy in the manner that best suits your business needs and team roles (Figure 2).<\/p>\n

And regardless of the approach or mix, the integration enables you to seamlessly leverage the full capabilities of Secure Workload including:<\/p>\n

Policy discovery and analysis:<\/strong> Automatically discover policies that are tailored to your environment by analyzing flow data ingested from the Secure Firewall protecting east-west workload communications.
\nPolicy enforcement:<\/strong> Onboard multiple east-west firewalls to automate and enforce microsegmentation policies on a specific firewall or set of firewalls through Secure Workload. (For more on this capability, Topology Awareness<\/em>, read my colleague\u2019s blog
Topology Matters).<\/a>
\nPolicy compliance monitoring:<\/strong> The network flow information, when compared against a baseline policy, provides a deep view into how your applications are behaving and complying against policies over time.\u00a0<\/strong><\/p>\n

Figure 2: <\/strong>Host-based and network-based approach with Secure Workload<\/strong><\/p>\n\n

Use case #3: Defense in depth with virtual patching via north-south network firewall<\/strong><\/h2>\n

This use case demonstrates how the integration delivers defense in depth and ultimately better security outcomes. In today\u2019s rapidly evolving digital landscape, applications play a vital role in every aspect of our lives. However, with the increased reliance on software, cyber threats have also become more sophisticated and pervasive. Traditional patching methods, although effective, may not always be feasible due to operational constraints and the risk of downtime. When a zero-day vulnerability is discovered, there are a few different scenarios that play out. Consider two common scenarios: 1) A newly discovered CVE poses an immediate risk and in this case the fix or the patch is not available and 2) The CVE is not highly critical so it\u2019s not worth patching it outside the usual patch window because of the production or business impact. In both cases, one must accept the interim risk and either wait for the patch to be available or for the patch window schedule.<\/p>\n

Virtual patching, a form of compensating control, is a security practice that allows you to mitigate this risk by applying an interim protection or a \u201cvirtual\u201d fix to known vulnerabilities in the software until it has been patched or updated. Virtual patching is typically done by leveraging the Intrusion Prevention System (IPS) of Cisco Secure Firewall. The key capability, fostered by the seamless integration, is Secure Workload\u2019s ability to share CVE information with Secure Firewall, thereby activating the relevant IPS policies for those CVEs. Let\u2019s take a look at how (Figure 3):<\/p>\n

The Secure Workload agents installed on the application workloads will gather telemetry about the software packages and CVEs present on the application workloads.
\nA workload-CVE mapping data is then published to Secure Firewall Management Center. You can choose the exact set of CVEs you want to publish. For example, you can choose to only publish CVEs that are exploitable over network as an attack vector and has CVSS score of 10. This would allow you to control any potential performance impact on your IPS.
\nFinally, the Secure Firewall Management Center then runs the \u2018firepower recommendations\u2019 tool to fine tune and enable the exact set of signatures that are needed to provide protection against the CVEs that were found on your workloads. Once the new signature set is crafted, it can be deployed to the north-south perimeter Secure Firewall.<\/p>\n

Figure 3: Virtual patching with Secure Workload and Secure Firewall<\/strong><\/p>\n\n

Flexibility and defense in depth is the key to a resilient zero trust microsegmentation strategy<\/strong><\/h2>\n

With Secure Workload and Secure Firewall, you can achieve a zero-trust security model by combining a host-based and network-based enforcement approach. In addition, with the virtual patching ability, you get another layer of defense that allows you to maintain the integrity and availability of your applications without sacrificing security. As the cyber threat landscape continues to evolve, harmony between different security solutions is undoubtedly the key to delivering more effective solutions that protect valuable digital assets.<\/p>\n

Learn more about Cisco Secure Workload<\/a> and Cisco Secure Firewall<\/a><\/p>\n

Sign up for a\u00a0Secure Workload workshop<\/a><\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Discover the flexibility of achieving zero-trust microsegmentation with Cisco Secure Workload and Secure Firewall, combining host-based and network-based enforcement, along with virtual patching for added defense.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

You hear a lot about zero trust microsegmentation these days and rightly so. It has matured into a proven security best-practice to effectively prevent unauthorized lateral movement across network\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

You hear a lot about zero trust microsegmentation these days and rightly so. It has matured into a proven security best-practice to effectively prevent unauthorized lateral movement across network resources. It involves dividing your network into isolated segments, or \u201cmicrosegments,\u201d where each segment has its own set of security policies and controls. In this way, even if a breach occurs or a potential threat gains access to a resource, the blast radius is contained.<\/p>\n

And like many security practices, there are different ways to achieve the objective, and typically much of it depends on the unique customer environment. For microsegmentation, the key is to have a trusted partner that not only provides a robust security solution but gives you the flexibility to adapt to your needs instead of forcing a \u201cone size fits all\u201d approach.<\/p>\n

Now, there are broadly two different approaches you can take to achieve your microsegmentation objectives:<\/p>\n

A host-based enforcement approach where the policies are enforced on the workload itself. This can be done by installing an agent on the workload or by leveraging APIs in public cloud.
\nA network-based enforcement approach where the policies are enforced on a network device like an east-west network firewall or a switch.<\/p>\n

While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the workloads, it may not always be a pragmatic approach for a myriad of reasons. These reasons can range from application team perceptions, network security team preferences, or simply the need for a different approach to achieve buy-in across the organization.<\/p>\n

Long story short, to make microsegmentation practical and achievable, it\u2019s clear that a dynamic duo of host and network-based security is key to a robust and resilient zero trust cybersecurity strategy. Earlier this year, Cisco completed the native integration between Cisco Secure Workload and Cisco Secure Firewall delivering on this principle and providing customers with unmatched flexibility as well as defense in depth. Let\u2019s take a deeper look at what this integration enables our customers to achieve and some of the use cases.<\/p>\n

Use case #1: Network visibility via an east-west network firewall<\/strong><\/h2>\n

The journey to microsegmentation starts with visibility. This is a perfect opportunity for me to insert the clich\u00e9 here \u2013 \u201cWhat you can\u2019t see, you can\u2019t protect.\u201d In the context of microsegmentation, flow visibility provides the foundation for building a blueprint of how applications communicate with each other, as well as users and devices \u2013 both within and outside the datacenter.<\/p>\n

The integration between Secure Workload and Secure Firewall enables the ingestion of NSEL flow records to provide network flow visibility, as shown in Figure 1. You can further enrich this network flow data by bringing in context in the form of labels and tags from external systems like CMDB, IPAM, identity sources, etc. This contextually enriched data set allows you to quickly identify the communication patterns and any indicators of compromise across your application landscape, enabling you to immediately improve your security posture.<\/p>\n

Figure 1: Secure Workload ingests NSEL flow records from Secure Firewall<\/strong><\/p>\n

Use case #2: Microsegmentation using the east-west network firewall<\/strong><\/h2>\n

The integration of Secure Firewall and Secure Workload provides two powerful complimentary methods to discover, compile, and enforce zero trust microsegmentation policies. The ability to use a host-based, network-based, or mix of the two methods gives you the flexibility to deploy in the manner that best suits your business needs and team roles (Figure 2).<\/p>\n

And regardless of the approach or mix, the integration enables you to seamlessly leverage the full capabilities of Secure Workload including:<\/p>\n

Policy discovery and analysis:<\/strong> Automatically discover policies that are tailored to your environment by analyzing flow data ingested from the Secure Firewall protecting east-west workload communications.
\nPolicy enforcement:<\/strong> Onboard multiple east-west firewalls to automate and enforce microsegmentation policies on a specific firewall or set of firewalls through Secure Workload. (For more on this capability, Topology Awareness<\/em>, read my colleague\u2019s blog
Topology Matters).<\/a>
\nPolicy compliance monitoring:<\/strong> The network flow information, when compared against a baseline policy, provides a deep view into how your applications are behaving and complying against policies over time.\u00a0<\/strong><\/p>\n

Figure 2: <\/strong>Host-based and network-based approach with Secure Workload<\/strong><\/p>\n

Use case #3: Defense in depth with virtual patching via north-south network firewall<\/strong><\/h2>\n

This use case demonstrates how the integration delivers defense in depth and ultimately better security outcomes. In today\u2019s rapidly evolving digital landscape, applications play a vital role in every aspect of our lives. However, with the increased reliance on software, cyber threats have also become more sophisticated and pervasive. Traditional patching methods, although effective, may not always be feasible due to operational constraints and the risk of downtime. When a zero-day vulnerability is discovered, there are a few different scenarios that play out. Consider two common scenarios: 1) A newly discovered CVE poses an immediate risk and in this case the fix or the patch is not available and 2) The CVE is not highly critical so it\u2019s not worth patching it outside the usual patch window because of the production or business impact. In both cases, one must accept the interim risk and either wait for the patch to be available or for the patch window schedule.<\/p>\n

Virtual patching, a form of compensating control, is a security practice that allows you to mitigate this risk by applying an interim protection or a \u201cvirtual\u201d fix to known vulnerabilities in the software until it has been patched or updated. Virtual patching is typically done by leveraging the Intrusion Prevention System (IPS) of Cisco Secure Firewall. The key capability, fostered by the seamless integration, is Secure Workload\u2019s ability to share CVE information with Secure Firewall, thereby activating the relevant IPS policies for those CVEs. Let\u2019s take a look at how (Figure 3):<\/p>\n

The Secure Workload agents installed on the application workloads will gather telemetry about the software packages and CVEs present on the application workloads.
\nA workload-CVE mapping data is then published to Secure Firewall Management Center. You can choose the exact set of CVEs you want to publish. For example, you can choose to only publish CVEs that are exploitable over network as an attack vector and has CVSS score of 10. This would allow you to control any potential performance impact on your IPS.
\nFinally, the Secure Firewall Management Center then runs the \u2018firepower recommendations\u2019 tool to fine tune and enable the exact set of signatures that are needed to provide protection against the CVEs that were found on your workloads. Once the new signature set is crafted, it can be deployed to the north-south perimeter Secure Firewall.<\/p>\n

Figure 3: Virtual patching with Secure Workload and Secure Firewall<\/strong><\/p>\n

Flexibility and defense in depth is the key to a resilient zero trust microsegmentation strategy<\/strong><\/h2>\n

With Secure Workload and Secure Firewall, you can achieve a zero-trust security model by combining a host-based and network-based enforcement approach. In addition, with the virtual patching ability, you get another layer of defense that allows you to maintain the integrity and availability of your applications without sacrificing security. As the cyber threat landscape continues to evolve, harmony between different security solutions is undoubtedly the key to delivering more effective solutions that protect valuable digital assets.<\/p>\n

Learn more about Cisco Secure Workload<\/a> and Cisco Secure Firewall<\/a><\/p>\n

Sign up for a\u00a0Secure Workload workshop<\/a><\/p>\n

We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social!<\/em><\/p>\n

Cisco Security Social Channels<\/strong><\/p>\n

Instagram<\/a><\/strong>Facebook<\/a><\/strong>Twitter<\/a><\/strong>LinkedIn<\/a><\/strong><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Discover the flexibility of achieving zero-trust microsegmentation with Cisco Secure Workload and Secure Firewall, combining host-based and network-based enforcement, along with virtual patching for added defense.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":1985,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1984","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nSecure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm\" \/>\n<meta property=\"og:description\" content=\"You hear a lot about zero trust microsegmentation these days and rightly so. It has matured into a proven security best-practice to effectively prevent unauthorized lateral movement across network\u2026 Read more on Cisco Blogs \u200b You hear a lot about zero trust microsegmentation these days and rightly so. It has matured into a proven security best-practice to effectively prevent unauthorized lateral movement across network resources. It involves dividing your network into isolated segments, or \u201cmicrosegments,\u201d where each segment has its own set of security policies and controls. In this way, even if a breach occurs or a potential threat gains access to a resource, the blast radius is contained. And like many security practices, there are different ways to achieve the objective, and typically much of it depends on the unique customer environment. For microsegmentation, the key is to have a trusted partner that not only provides a robust security solution but gives you the flexibility to adapt to your needs instead of forcing a \u201cone size fits all\u201d approach. Now, there are broadly two different approaches you can take to achieve your microsegmentation objectives: A host-based enforcement approach where the policies are enforced on the workload itself. This can be done by installing an agent on the workload or by leveraging APIs in public cloud. A network-based enforcement approach where the policies are enforced on a network device like an east-west network firewall or a switch. While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the workloads, it may not always be a pragmatic approach for a myriad of reasons. These reasons can range from application team perceptions, network security team preferences, or simply the need for a different approach to achieve buy-in across the organization. Long story short, to make microsegmentation practical and achievable, it\u2019s clear that a dynamic duo of host and network-based security is key to a robust and resilient zero trust cybersecurity strategy. Earlier this year, Cisco completed the native integration between Cisco Secure Workload and Cisco Secure Firewall delivering on this principle and providing customers with unmatched flexibility as well as defense in depth. Let\u2019s take a deeper look at what this integration enables our customers to achieve and some of the use cases. Use case #1: Network visibility via an east-west network firewall The journey to microsegmentation starts with visibility. This is a perfect opportunity for me to insert the clich\u00e9 here \u2013 \u201cWhat you can\u2019t see, you can\u2019t protect.\u201d In the context of microsegmentation, flow visibility provides the foundation for building a blueprint of how applications communicate with each other, as well as users and devices \u2013 both within and outside the datacenter. The integration between Secure Workload and Secure Firewall enables the ingestion of NSEL flow records to provide network flow visibility, as shown in Figure 1. You can further enrich this network flow data by bringing in context in the form of labels and tags from external systems like CMDB, IPAM, identity sources, etc. This contextually enriched data set allows you to quickly identify the communication patterns and any indicators of compromise across your application landscape, enabling you to immediately improve your security posture. Figure 1: Secure Workload ingests NSEL flow records from Secure Firewall Use case #2: Microsegmentation using the east-west network firewall The integration of Secure Firewall and Secure Workload provides two powerful complimentary methods to discover, compile, and enforce zero trust microsegmentation policies. The ability to use a host-based, network-based, or mix of the two methods gives you the flexibility to deploy in the manner that best suits your business needs and team roles (Figure 2). And regardless of the approach or mix, the integration enables you to seamlessly leverage the full capabilities of Secure Workload including: Policy discovery and analysis: Automatically discover policies that are tailored to your environment by analyzing flow data ingested from the Secure Firewall protecting east-west workload communications. Policy enforcement: Onboard multiple east-west firewalls to automate and enforce microsegmentation policies on a specific firewall or set of firewalls through Secure Workload. (For more on this capability, Topology Awareness, read my colleague\u2019s blog Topology Matters). Policy compliance monitoring: The network flow information, when compared against a baseline policy, provides a deep view into how your applications are behaving and complying against policies over time.\u00a0 Figure 2: Host-based and network-based approach with Secure Workload Use case #3: Defense in depth with virtual patching via north-south network firewall This use case demonstrates how the integration delivers defense in depth and ultimately better security outcomes. In today\u2019s rapidly evolving digital landscape, applications play a vital role in every aspect of our lives. However, with the increased reliance on software, cyber threats have also become more sophisticated and pervasive. Traditional patching methods, although effective, may not always be feasible due to operational constraints and the risk of downtime. When a zero-day vulnerability is discovered, there are a few different scenarios that play out. Consider two common scenarios: 1) A newly discovered CVE poses an immediate risk and in this case the fix or the patch is not available and 2) The CVE is not highly critical so it\u2019s not worth patching it outside the usual patch window because of the production or business impact. In both cases, one must accept the interim risk and either wait for the patch to be available or for the patch window schedule. Virtual patching, a form of compensating control, is a security practice that allows you to mitigate this risk by applying an interim protection or a \u201cvirtual\u201d fix to known vulnerabilities in the software until it has been patched or updated. Virtual patching is typically done by leveraging the Intrusion Prevention System (IPS) of Cisco Secure Firewall. The key capability, fostered by the seamless integration, is Secure Workload\u2019s ability to share CVE information with Secure Firewall, thereby activating the relevant IPS policies for those CVEs. Let\u2019s take a look at how (Figure 3): The Secure Workload agents installed on the application workloads will gather telemetry about the software packages and CVEs present on the application workloads. A workload-CVE mapping data is then published to Secure Firewall Management Center. You can choose the exact set of CVEs you want to publish. For example, you can choose to only publish CVEs that are exploitable over network as an attack vector and has CVSS score of 10. This would allow you to control any potential performance impact on your IPS. Finally, the Secure Firewall Management Center then runs the \u2018firepower recommendations\u2019 tool to fine tune and enable the exact set of signatures that are needed to provide protection against the CVEs that were found on your workloads. Once the new signature set is crafted, it can be deployed to the north-south perimeter Secure Firewall. Figure 3: Virtual patching with Secure Workload and Secure Firewall Flexibility and defense in depth is the key to a resilient zero trust microsegmentation strategy With Secure Workload and Secure Firewall, you can achieve a zero-trust security model by combining a host-based and network-based enforcement approach. In addition, with the virtual patching ability, you get another layer of defense that allows you to maintain the integrity and availability of your applications without sacrificing security. As the cyber threat landscape continues to evolve, harmony between different security solutions is undoubtedly the key to delivering more effective solutions that protect valuable digital assets. Learn more about Cisco Secure Workload and Cisco Secure Firewall Sign up for a\u00a0Secure Workload workshop We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Discover the flexibility of achieving zero-trust microsegmentation with Cisco Secure Workload and Secure Firewall, combining host-based and network-based enforcement, along with virtual patching for added defense.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-15T18:51:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm\",\"datePublished\":\"2023-12-15T18:51:13+00:00\",\"dateModified\":\"2023-12-15T18:51:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/\"},\"wordCount\":1329,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/\",\"name\":\"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif\",\"datePublished\":\"2023-12-15T18:51:13+00:00\",\"dateModified\":\"2023-12-15T18:51:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/","og_locale":"en_US","og_type":"article","og_title":"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm","og_description":"You hear a lot about zero trust microsegmentation these days and rightly so. It has matured into a proven security best-practice to effectively prevent unauthorized lateral movement across network\u2026 Read more on Cisco Blogs \u200b You hear a lot about zero trust microsegmentation these days and rightly so. It has matured into a proven security best-practice to effectively prevent unauthorized lateral movement across network resources. It involves dividing your network into isolated segments, or \u201cmicrosegments,\u201d where each segment has its own set of security policies and controls. In this way, even if a breach occurs or a potential threat gains access to a resource, the blast radius is contained. And like many security practices, there are different ways to achieve the objective, and typically much of it depends on the unique customer environment. For microsegmentation, the key is to have a trusted partner that not only provides a robust security solution but gives you the flexibility to adapt to your needs instead of forcing a \u201cone size fits all\u201d approach. Now, there are broadly two different approaches you can take to achieve your microsegmentation objectives: A host-based enforcement approach where the policies are enforced on the workload itself. This can be done by installing an agent on the workload or by leveraging APIs in public cloud. A network-based enforcement approach where the policies are enforced on a network device like an east-west network firewall or a switch. While a host-based enforcement approach is immensely powerful because it provides access to rich telemetry in terms of processes, packages, and CVEs running on the workloads, it may not always be a pragmatic approach for a myriad of reasons. These reasons can range from application team perceptions, network security team preferences, or simply the need for a different approach to achieve buy-in across the organization. Long story short, to make microsegmentation practical and achievable, it\u2019s clear that a dynamic duo of host and network-based security is key to a robust and resilient zero trust cybersecurity strategy. Earlier this year, Cisco completed the native integration between Cisco Secure Workload and Cisco Secure Firewall delivering on this principle and providing customers with unmatched flexibility as well as defense in depth. Let\u2019s take a deeper look at what this integration enables our customers to achieve and some of the use cases. Use case #1: Network visibility via an east-west network firewall The journey to microsegmentation starts with visibility. This is a perfect opportunity for me to insert the clich\u00e9 here \u2013 \u201cWhat you can\u2019t see, you can\u2019t protect.\u201d In the context of microsegmentation, flow visibility provides the foundation for building a blueprint of how applications communicate with each other, as well as users and devices \u2013 both within and outside the datacenter. The integration between Secure Workload and Secure Firewall enables the ingestion of NSEL flow records to provide network flow visibility, as shown in Figure 1. You can further enrich this network flow data by bringing in context in the form of labels and tags from external systems like CMDB, IPAM, identity sources, etc. This contextually enriched data set allows you to quickly identify the communication patterns and any indicators of compromise across your application landscape, enabling you to immediately improve your security posture. Figure 1: Secure Workload ingests NSEL flow records from Secure Firewall Use case #2: Microsegmentation using the east-west network firewall The integration of Secure Firewall and Secure Workload provides two powerful complimentary methods to discover, compile, and enforce zero trust microsegmentation policies. The ability to use a host-based, network-based, or mix of the two methods gives you the flexibility to deploy in the manner that best suits your business needs and team roles (Figure 2). And regardless of the approach or mix, the integration enables you to seamlessly leverage the full capabilities of Secure Workload including: Policy discovery and analysis: Automatically discover policies that are tailored to your environment by analyzing flow data ingested from the Secure Firewall protecting east-west workload communications. Policy enforcement: Onboard multiple east-west firewalls to automate and enforce microsegmentation policies on a specific firewall or set of firewalls through Secure Workload. (For more on this capability, Topology Awareness, read my colleague\u2019s blog Topology Matters). Policy compliance monitoring: The network flow information, when compared against a baseline policy, provides a deep view into how your applications are behaving and complying against policies over time.\u00a0 Figure 2: Host-based and network-based approach with Secure Workload Use case #3: Defense in depth with virtual patching via north-south network firewall This use case demonstrates how the integration delivers defense in depth and ultimately better security outcomes. In today\u2019s rapidly evolving digital landscape, applications play a vital role in every aspect of our lives. However, with the increased reliance on software, cyber threats have also become more sophisticated and pervasive. Traditional patching methods, although effective, may not always be feasible due to operational constraints and the risk of downtime. When a zero-day vulnerability is discovered, there are a few different scenarios that play out. Consider two common scenarios: 1) A newly discovered CVE poses an immediate risk and in this case the fix or the patch is not available and 2) The CVE is not highly critical so it\u2019s not worth patching it outside the usual patch window because of the production or business impact. In both cases, one must accept the interim risk and either wait for the patch to be available or for the patch window schedule. Virtual patching, a form of compensating control, is a security practice that allows you to mitigate this risk by applying an interim protection or a \u201cvirtual\u201d fix to known vulnerabilities in the software until it has been patched or updated. Virtual patching is typically done by leveraging the Intrusion Prevention System (IPS) of Cisco Secure Firewall. The key capability, fostered by the seamless integration, is Secure Workload\u2019s ability to share CVE information with Secure Firewall, thereby activating the relevant IPS policies for those CVEs. Let\u2019s take a look at how (Figure 3): The Secure Workload agents installed on the application workloads will gather telemetry about the software packages and CVEs present on the application workloads. A workload-CVE mapping data is then published to Secure Firewall Management Center. You can choose the exact set of CVEs you want to publish. For example, you can choose to only publish CVEs that are exploitable over network as an attack vector and has CVSS score of 10. This would allow you to control any potential performance impact on your IPS. Finally, the Secure Firewall Management Center then runs the \u2018firepower recommendations\u2019 tool to fine tune and enable the exact set of signatures that are needed to provide protection against the CVEs that were found on your workloads. Once the new signature set is crafted, it can be deployed to the north-south perimeter Secure Firewall. Figure 3: Virtual patching with Secure Workload and Secure Firewall Flexibility and defense in depth is the key to a resilient zero trust microsegmentation strategy With Secure Workload and Secure Firewall, you can achieve a zero-trust security model by combining a host-based and network-based enforcement approach. In addition, with the virtual patching ability, you get another layer of defense that allows you to maintain the integrity and availability of your applications without sacrificing security. As the cyber threat landscape continues to evolve, harmony between different security solutions is undoubtedly the key to delivering more effective solutions that protect valuable digital assets. Learn more about Cisco Secure Workload and Cisco Secure Firewall Sign up for a\u00a0Secure Workload workshop We\u2019d love to hear what you think. Ask a Question, Comment Below, and Stay Connected with Cisco Security on social! Cisco Security Social Channels InstagramFacebookTwitterLinkedIn Share Share: \u00a0\u00a0Discover the flexibility of achieving zero-trust microsegmentation with Cisco Secure Workload and Secure Firewall, combining host-based and network-based enforcement, along with virtual patching for added defense.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/","og_site_name":"JHC","article_published_time":"2023-12-15T18:51:13+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/"},"author":{"name":"","@id":""},"headline":"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm","datePublished":"2023-12-15T18:51:13+00:00","dateModified":"2023-12-15T18:51:13+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/"},"wordCount":1329,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/","url":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/","name":"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif","datePublished":"2023-12-15T18:51:13+00:00","dateModified":"2023-12-15T18:51:13+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/12\/16496954-UO6avN.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/secure-workload-and-secure-firewall-the-recipe-for-a-robust-zero-trust-cybersecurity-strategy-amandeep-singh-on-december-15-2023-at-100-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Secure Workload and Secure Firewall: The recipe for a robust zero trust cybersecurity strategy Amandeep Singh on December 15, 2023 at 1:00 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1984","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=1984"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1984\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/1985"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=1984"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=1984"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=1984"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}