CERC2021 stc Issa Alsuwait
CERC2021 stc Issa Alsuwait
5G Critical Infrastructure
SA Commercialization
With Zero-Trust Security Model
Pioneering Experience in Middle East
06. References
What is
01 Zero Trust?
CERC2021 stc Kuwait
Trust No One
All access must be
authenticated authorized and
VERIFIED ALL THE TIME
IT/OT environment evolving
Verify explicitly
ZERO TRUST
Zero Trust across the digital estate
Devices
Zero
Trust
Objective:
Harden defenses and
detect and respond to
threats in real time.
Infrastructure
Zero
Trust
Objective:
Move beyond traditional
network security
approaches, Utilize AI
and ML traffic analysis.
Network
Annual Report 2019 | stc group
References: - NSA - National Security Agency - PP-21-0191 | February 2021 Ver. 1.0
- NIST - National Institute of standards & Technology SP 800-207, Zero Trust Architecture
Why Zero-trust security Model
02 important for Critical Infrastructure?
Why Zero-trust security Model important for Critical Infrastructure?
Faster detection
Increased of internal Reduces lateral
visibility attacker/compromised movement after attack
accounts
Increase Remediate
Assurance Risk
Allow
Allow limited Block
full access Access access
Continuous policy
assessment and In-session monitoring and policy enforcement
enforcement
User Risk
Access Method Attempts to Access Network Repositories (Servers & Software) Visibility Analytics
Malicious actor
compromises Blocked: Lateral movement prevented by
user’s device and segmentation and default-deny policy
credentials
1 2 3 4 5
Identify Continuously
Architect Embrace security
Users, Map the flows monitor zero-trust
zero trust automation and
Systems & of sensitive ecosystem with
micro- orchestration
sensitive data data security analytics
perimeters
05 The Time of AI & ML based cyber security
systems for critical infrastructures
Why AI & ML based Cyber security systems?
There are five core use cases that Artificial Intelligence support to improve the
cyber hygiene and operational excellence:
Always Hunting
AI Cyber Security systems
AI never sleeps, keeps learning & enhancing detection accuracy, nowadays available for both
and as a result will be able to continuously monitor & discover IT & OT critical
anomalous behaviors as they occur infrastructures
References