Executive Summary

The concept of a trusted internal network is obsolete. NIST Special Publication 800-207, “Zero Trust Architecture,” codifies a new security paradigm for the modern enterprise: never trust, always verify. This framework moves defenses from static, perimeter-based models to one focused on users, assets, and resources. VMware’s vDefend security suite, with its intrinsic, workload-centric approach, provides the foundational tools to build and operate a true Zero Trust Architecture (ZTA). This post will detail how vDefend’s capabilities align directly with the core tenets and logical components of NIST SP 800-207, helping organizations eliminate implicit trust and build a more resilient, modern security posture.

Understanding NIST SP 800-207: The Zero Trust Mandate

NIST SP 800-207 provides an abstract definition and a roadmap for implementing Zero Trust. The core philosophy is that no actor, system, network, or service operating inside or outside the security perimeter is trusted. Instead, every access request must be thoroughly evaluated and granted on a least-privilege, per-session basis. This approach is designed to protect modern, distributed environments that include remote users, cloud services, and IoT devices.

The framework is built upon seven core tenets that shift the focus from protecting a network to protecting resources. It also defines the core logical components of a ZTA:

  • Policy Engine (PE): The brain (NSX Manager) of the operation. It makes the final decision to grant or deny access based on enterprise policy and input from various sources (like threat intelligence and identity systems).
  • Policy Administrator (PA): The component responsible for establishing and shutting down the communication path between a user and a resource, based on the PE’s decision.
  • Policy Enforcement Point (PEP): The component that actually enables, monitors, and terminates connections. It is the “gatekeeper” that sits in the data path. (Distributed Firewall)

Introducing VMware vDefend

VMware vDefend is a suite of security solutions built to protect modern, virtualized data centers and private clouds. By building security directly into the infrastructure, vDefend provides a more effective and operationally simple approach to implementing Zero Trust. Its key components include:

  • vDefend Distributed Firewall: A software-defined firewall that delivers granular control for every workload. It excels at micro-segmentation, which is a critical tactic for creating the isolated resource segments required in a ZTA. In a ZTA, the Distributed Firewall acts as the Policy Enforcement Point (PEP), as it is embedded in the hypervisor and directly controls the flow of traffic for each workload.
  • vDefend Advanced Threat Prevention (ATP): This is a multi-layered threat detection engine that includes:
    • Intrusion Detection/Prevention System (IDS/IPS): Protects against known, signature-based threats.
    • Malware Prevention: Analyzes unknown files in a safe, isolated environment to detect novel malware.
    • Network Traffic Analysis (NTA): Uses machine learning to baseline normal behavior and detect anomalies that could indicate an attack. These components provide critical threat intelligence and posture assessment data to the Policy Engine.
  • Security Intelligence: An analytics engine that visualizes traffic flows and provides automated recommendations for micro-segmentation policies, dramatically simplifying the creation of Zero Trust policies for the Policy Administrator.
  • Network Detection and Response (NDR): A correlation engine that ingests alerts from all ATP components and stitches them together into intelligent “intrusion campaigns,” providing security teams with the rich telemetry needed for the Policy Engine to make dynamic, risk-based decisions.

Bridging the Gap: How vDefend Implements the Tenets of Zero Trust

The vDefend suite provides tangible tools to implement the core principles of the NIST Zero Trust Architecture.

NIST 800-207 TenetHow vDefend Addresses It
1. All data sources and computing services are considered resources.Security Intelligence provides the visibility to identify and categorize all workloads, applications, and their communication flows, treating each as a distinct resource to be protected. This is the foundational step before any policy can be created.
2. All communication is secured regardless of network location.The vDefend Distributed Firewall is location-agnostic. Because it is attached to the virtual network interface of every workload, it secures communication whether the workload is on-premises, in a private cloud, or part of a hybrid environment. It enforces the same policy regardless of the underlying network topology.
3. Access to individual enterprise resources is granted on a per-session basis.The Distributed Firewall acts as the Policy Enforcement Point (PEP) for every session. It evaluates each new connection request against the defined security policy before allowing the session to be established, ensuring there is no lingering or implicit trust from previous sessions.
4. Access to resources is determined by dynamic policy.vDefend policies are not limited to static IP addresses. Policies can be based on dynamic attributes like workload names, security tags, user identity, and operating system. The NSX Manager, acting as the Policy Administrator and Policy Engine, uses this rich context to make intelligent access decisions.
5. The enterprise monitors and measures the integrity and security posture of all owned and associated assets.vDefend Advanced Threat Prevention (ATP) continuously monitors workloads. The NTA and IDS/IPS capabilities provide constant feedback on the security posture of each asset, detecting anomalies or threats. This data serves as a critical input to the Policy Engine, which can use it to alter trust decisions in real time.
6. All resource authentication and authorization are dynamic and strictly enforced before access is allowed.The Distributed Firewall is the mechanism that strictly enforces the dynamic authorization determined by the policy engine. Access is explicitly verified for every new session, every time, with no exceptions. If a workload’s security posture changes (e.g., malware is detected by ATP), the Policy Engine can instruct the firewall to terminate the session.
7. The enterprise collects as much information as possible… and uses it to improve its security posture.The entire vDefend suite is a rich source of telemetry. Logs from the firewall, IDS/IPS, NTA, and NDR provide a continuous feedback loop that allows security teams to analyze the effectiveness of their policies, hunt for threats, and refine their Zero Trust posture over time.

Practical Application: A Use-Case Scenario

Consider an organization migrating to a Zero Trust Architecture to protect its intellectual property (IP).

  1. Identify Resources and Flows (Tenet 1): The security team uses vDefend Security Intelligence to map out the entire application landscape. They discover that the engineering application servers (the “resource”) communicate with a central code repository. They see not only the intended communication but also discover that some engineering servers are communicating with an unsanctioned, external file-sharing site.
  2. Create a Micro-Segment (Tenet 2, 4): Using the vDefend Distributed Firewall, they create a micro-segment around the code repository. They define a dynamic policy stating that only workloads with the “engineering-app” security tag can communicate with workloads tagged as “code-repo” on TCP port 3306. A second rule explicitly denies any outbound traffic from the “engineering-app” group to the external file-sharing site. All other communication, regardless of its origin, is denied by default.
  3. Enforce Per-Session Access (Tenet 3, 6): An engineer logs in. Their virtual desktop, part of the “engineering-app” group, attempts to connect to the repository. The Distributed Firewall (PEP) evaluates this specific session request against the policy, verifies it is allowed, and grants access. When the session ends, the trust is revoked. If the same desktop later tries to connect to the blocked file-sharing site, the PEP denies the session instantly.
  4. Monitor and Respond (Tenet 5, 7): An attacker compromises a marketing server via a phishing email. They attempt to scan the network and discover the code repository. The NTA engine immediately flags this as anomalous behavior, as the marketing server has never communicated with the repository before. The NDR engine correlates this reconnaissance scan with a low-level IDS alert and presents it to the security team as a single “Lateral Movement” campaign. Because of the Zero Trust policy, the connection was already blocked by the Distributed Firewall, but the rich telemetry allows the team to instantly identify the compromised marketing server, understand the attacker’s intent, and begin remediation without any impact on the protected IP.

Conclusion

Implementing a Zero Trust Architecture as envisioned by NIST SP 800-207 requires a fundamental shift in security strategy and tooling. It demands visibility, granular control, and rich intelligence. VMware’s vDefend suite provides the foundational capabilities to make Zero Trust a reality. By enabling organizations to micro-segment their environments, create dynamic, identity-aware policies, and continuously monitor their security posture, vDefend empowers them to move beyond the legacy perimeter and build a more secure, resilient enterprise for the modern era.

Unknown's avatar

VCP-DV, VCP-NV, VCAP-DCD currently working at VMware in the PSO organization​.

Leave a comment