Zero Trust


 HillTop 8 understands the intricacies of implementing a Zero Trust Architecture (ZTA) for our customers and has a wealth of subject matter expertise in some of the key technical areas which support a ZTA implementation. Our implementation approach is based on the seven pillar Zero Trust Framework model and relies on our corporate expertise in the following areas:

Identity, Credential, and Access Management (ICAM)

Our Subject Matter Experts have years of experience implementing multi-factor authentication (MFA) and access control solutions at the endpoint and resource levels for both person entities and non-person entities. We also understand directory services and know how to implement granulated privileged access to resources.

Endpoint Management

We have experts who have implemented Host Based Security Services, Malware protection, Desired State Configuration Enforcement, Application Whitelisting, Configuration Management, Device Encryption, Privileged Access Control, and device isolation for unmanaged nodes.

Networking

We have experienced network engineers who have implemented Software Defined (SD) networks and understand how to provide segmentation to further protect access to critical resources.

Applications and Workloads

Our developers utilize the latest DevSecOp processes and also leverage the latest containerization and virtualization technologies to ensure the development of reliable and secure code. We have Supply Chain Risk Management (SCRM) experts who examine commercial and open-source code to ensure its integrity.

Data Protection

Our Data Scientists and Engineers know how to implement encryption solutions for data in transit and at rest. They have also implemented Digital Rights Management (DRM) solutions based upon Microsoft, Adobe and other vendors. They have also implemented many different types of XML data tagging solutions which comply with IC and DoD standards. Data tagging is a necessary component of data access control.

Orchestration and Automation

Our ICAM Engineers have in-depth experience with the implementation and enforcement of digital policies and have developed highly complex access control policies, developed Policy Decision Points (both internally to applications and externally), and developed code to perform policy enforcement within applications. Our Cybersecurity engineers are also versed in deploying commercial Security Information and Event Management (SIEM) in conjunction with Security Orchestration, Automation, and Response (SOAR) solutions for our government customers.

Analytics and Visibility

Our Cybersecurity Engineers have implemented several commercial audit collection services and tied them to SIEMs on an enterprise level to perform analytics on security audit data. They have also implemented User Activity Monitoring (UAM) solutions for our government customers which let them analyze the data access behaviors of network users to enforce appropriate data access. Our engineers have also employed numerous threat detection solutions which are fed along with UAM and audit data into SIEM tools which highlight areas of concern across the enterprise.


While this is not an all inclusive list of the types of services required to deploy a Zero Trust Architecture, our customers can rest assured that HillTop 8 has the necessary skill and experience on board to plan and deploy a Zero Trust Architecture for our customers.