Concepts
Baseline Security Concept
TRASAGATE is designed with a foundational security approach that aligns with the zero trust access control paradigm. The following key principles shape TRASAGATE's methodology for securing access to your enterprise resources:
1. Controlled Remote Access Points
While zero trust advocates for access from anywhere at any time, it doesn’t imply unrestricted access to remote services. TRASAGATE enhances your bastion servers to facilitate risk-based remote access, ensuring that users can connect from anywhere as long as their connection meets security standards.
2. Security Posture of User Devices
User devices, such as mobile devices and workstations, handle all aspects of remote access, including processing and storing sensitive data. If a user's device is compromised, server-side security measures may become ineffective. TRASAGATE grants access to servers and services based on the security posture of user devices, which is critical to achieving zero trust.
3. Monitoring and Auditing Trusted Access
Many security breaches involve the misuse of trusted credentials, networks, and devices. TRASAGATE provides comprehensive visibility into active authorized sessions, enabling real-time auditing and future analysis of any malicious activities hidden within trusted access.
4. Real-Time View of Remote Access
TRASAGATE equips administrators with a real-time view of:
- All authorized users and devices for remote access
- All remote access points within your infrastructure
- All services with remote access enabled
Zero Trust Access Control
TRASAGATE implements a robust zero trust access control model that includes:
1. Continuous Authentication and Authorization
TRASAGATE continuously verifies the identity and access rights of users and devices throughout their sessions. This ensures that access is immediately revoked if a user's credentials are compromised or if their device fails to comply with security policies.
2. Granular Access Policies
TRASAGATE allows you to define fine-grained access policies based on user roles, device posture, location, time, and other contextual factors. This enables the enforcement of the principle of least privilege, ensuring that users only have access to the resources they need to perform their duties.
3. Secure Access Proxy
TRASAGATE's secure access proxy acts as a gateway between users and your enterprise resources, enforcing access policies and securely routing traffic to the appropriate backend services. The access proxy ensures that all access requests are authenticated, authorized, and encrypted, minimizing the risk of unauthorized access and data breaches.
By implementing these key concepts and principles, TRASAGATE helps you establish a strong zero trust access control framework that protects your critical assets and enables secure, scalable access to your enterprise resources.