1-Establish Trust
- User & device identity
- Device posture & vulnerabilities
- 802.1X with user/machine authentication and SGACL
- External authentication with identity store like AD
- multi-factor authentication (MFA)
2-Enforce Trust-Based Access
- RBAC with TrustSec and Dynamic SGT
3-Continuously Verify Trust
- Cisco Secure Network Analystics to Continuously monitor Malicious activities
- Cisco Secure Firewall with IPS and AMP
4-Respond to Change in Trust
- ANC Adaptive Network Control with Quanratine SGT for any suspicious or malicious hosts
- Cisco Secure Network Analytics and Cisco ISE integration with ANC
- Cisco Secure Firewall with IPS and Malware Inspection block hosts with any intrusion or infection.