Skip to contentRed Hat

Navigation

AI
  • Our approach

    • News and insights
    • Technical blog
    • Research
    • Live AI events
    • Explore AI at Red Hat
  • Our portfolio

    • Red Hat AI
    • Red Hat Enterprise Linux AI
    • Red Hat OpenShift AI
    • Red Hat AI Inference Server New
  • Engage & learn

    • AI learning hub
    • AI partners
    • Services for AI
Hybrid cloud
  • Use cases

    • Artificial intelligence

      Build, deploy, and monitor AI models and apps.

    • Linux standardization

      Get consistency across operating environments.

    • Application development

      Simplify the way you build, deploy, and manage apps.

    • Automation

      Scale automation and unite tech, teams, and environments.

    • Virtualization

      Modernize operations for virtualized and containerized workloads.

    • Security

      Code, build, deploy, and monitor security-focused software.

    • Edge computing

      Deploy workloads closer to the source with edge technology.

    • Explore solutions
  • Solutions by industry

    • Automotive
    • Financial services
    • Healthcare
    • Industrial sector
    • Media and entertainment
    • Public sector
    • Telecommunications

Discover cloud technologies

Learn how to use our cloud products and solutions at your own pace in the Red Hat® Hybrid Cloud Console.

Products
  • Platforms

    • Red Hat AI

      Develop and deploy AI solutions across the hybrid cloud.

    • Red Hat Enterprise Linux

      Support hybrid cloud innovation on a flexible operating system.

      New version
    • Red Hat OpenShift

      Build, modernize, and deploy apps at scale.

    • Red Hat Ansible Automation Platform

      Implement enterprise-wide automation.

  • Featured

    • Red Hat OpenShift Virtualization Engine
    • Red Hat OpenShift Service on AWS
    • Microsoft Azure Red Hat OpenShift
    • See all products
  • Try & buy

    • Start a trial
    • Buy online
    • Integrate with major cloud providers
  • Services & support

    • Consulting
    • Product support
    • Services for AI
    • Technical Account Management
    • Explore services
Training
  • Training & certification

    • Courses and exams
    • Certifications
    • Red Hat Academy
    • Learning community
    • Learning subscription
    • Explore training
  • Featured

    • Red Hat Certified System Administrator exam
    • Red Hat System Administration I
    • Red Hat Learning Subscription trial (No cost)
    • Red Hat Certified Engineer exam
    • Red Hat Certified OpenShift Administrator exam
  • Services

    • Consulting
    • Partner training
    • Product support
    • Services for AI
    • Technical Account Management
Learn
  • Build your skills

    • Documentation
    • Hands-on labs
    • Hybrid cloud learning hub
    • Interactive learning experiences
    • Training and certification
  • More ways to learn

    • Blog
    • Events and webinars
    • Podcasts and video series
    • Red Hat TV
    • Resource library

For developers

Discover resources and tools to help you build, deliver, and manage cloud-native applications and services.

Partners
  • For customers

    • Our partners
    • Red Hat Ecosystem Catalog
    • Find a partner
  • For partners

    • Partner Connect
    • Become a partner
    • Training
    • Support
    • Access the partner portal

Build solutions powered by trusted partners

Find solutions from our collaborative community of experts and technologies in the Red Hat® Ecosystem Catalog.

Search

I'd like to:

  • Start a trial
  • Manage subscriptions
  • See Red Hat jobs
  • Explore tech topics
  • Contact sales
  • Contact customer service

Help me find:

  • Documentation
  • Developer resources
  • Skills assessments
  • Architecture center
  • Security updates
  • Support cases

I want to learn more about:

  • AI
  • Application modernization
  • Automation
  • Cloud-native applications
  • Linux
  • Virtualization
ConsoleDocsSupportNew For you

Recommended

We'll recommend resources you may like as you browse. Try these suggestions for now.

  • Product trial center
  • Courses and exams
  • All products
  • Tech topics
  • Resource library
Log in

Sign in or create an account to get more from Red Hat

  • World-class support
  • Training resources
  • Product trials
  • Console access

A subscription may be required for some services.

Log in or register
Contact us
  • Home
  • Resources
  • Build a secure foundation with zero trust and Red Hat Ansible Automation Platform

Build a secure foundation with zero trust and Red Hat Ansible Automation Platform

September 15, 2022•
Resource type: E-book
Download PDF

01 Introduction to zero trust security architecture

Your organization doesn’t shut down after 5 p.m. Neither do the cyber criminals and other bad actors searching for opportunities to steal data or wreak other havoc that can jeopardize your company, partners, and customers.

Today, organizations face a perfect storm of cybersecurity threats that keep IT, security, and operations teams on high alert. These threats affect organizations of all sizes and can cost billions. According to an IBM report, the average cost for a data breach from a cyberattack was US$4.24 million in 2021, up from US$3.86 million in 2020.1

These threats aren’t restricted to external attackers either. The 2021 Data Breach Investigations Report from Verizon stated that 30% of breaches involved employees accessing systems outside their defined roles and permissions.2

The increase in the number and severity of attacks is driven by multiple factors, including rapid changes in network infrastructure, migrations from on-premise to cloud-based solutions, and the rise of remote work and work-from-home models since 2020. 

The change to where employees work remotely has expanded attack surfaces, with both company-owned and employee-owned devices accessing sensitive systems over personal and public internet connections. There has also been an increase in the number and sophistication of phishing and spear-phishing attacks as employees work with colleagues they have never met.

The move to cloud-based solutions introduces numerous benefits for organizations—from cost savings to a significant reduction in physical document storage. But those benefits come with the ubiquitous cost of managing user, application, and infrastructure security for hundreds to thousands of users across legacy on-premise and cloud-based systems. 

The combination of remote work and the move to the cloud have rendered the traditional VPN walled garden approach to security obsolete. In addition to employees connecting from more devices to more systems, the introduction of IoT and edge computing have exposed new potential attack vectors to cyber attackers.

Beyond the ways employees access systems, organizations have also scaled teams to manage disparate network and security systems. InfoSec, SysOps, NetOps, and other teams often work concurrently—and often independently from each other—to enforce security policies and respond to threats. Still, these teams often work separately, use different systems, and do not share common processes that affect their ability to coordinate a response. When it comes to security threats, every second counts in the response.

Learn how to build a zero trust foundation with Linux.

Download the whitepaper >>

Another challenge driving cyberattack risks is that there is a lack of integration between the solutions powering and protecting organizational infrastructure. This creates additional roadblocks to efficient response to security incidents if the teams managing these solutions aren’t able to communicate efficiently. 

These cyberattack risks have attracted attention beyond security leaders. Organizations and vendors have adapted to support regulations including the California Consumer Privacy Act (CCPA) and the European Union’s General Data Protection Regulation (GDPR). In 2021, the United States government recognized these threat increases with the introduction of the Executive Order on Improving the Nation’s Cybersecurity.

Addressing these threats requires organizations to have a security-first mindset across their policies, networks, and applications. Many organizations are looking to zero trust architecture as a way forward, including the U.S. federal government with its mandate to advance towards implementing zero trust architecture across their networks.

But implementing zero trust is only the beginning—especially in large organizations with multiple sites and a mix of on-premise, cloud, and edge systems. Scaling zero trust architecture requires enterprise-level automation. In this e-book, you will learn how Red Hat® Ansible® Automation Platform is the right solution for your organization.

02 Zero trust to the rescue?

Traditional security models were built around systems that employees would access from inside a physical location. As remote access options evolved from dial-up to always-on high-speed connections, external access was regulated with virtual private networks (VPNs). While VPNs provide secure authentication to a network, they also expose more resources and systems to users than they would need to access—creating potential security risks.

But today, VPNs and standard user-based permissions can no longer provide the level of security needed for the complicated on-premise, hybrid, and cloud-based solution architecture that organizations depend on to do business. A new model was needed, one that makes a foundational change to how we approach security. This shift in how security is approached is zero trust architecture. 

Recognized as a security pattern in 2010, zero trust starts by assuming that there are attackers inside and outside of the network. Working off this assumption, zero trust defaults to starting every interaction in an untrusted state.

Instead of relying solely on location and role or user-based permissions, the zero trust framework requires that the user, device, and application are verified to create a trusted state for the interaction. Implementing zero trust encourages an entirely new security mindset by instructing system architects to authenticate a user or devices with each transaction, and only authorize access to data and systems based on the concept of least privilege. 

Authenticating every transaction

The foundation of zero trust architecture is treating every interaction as a potential threat—inside and outside of the network. Before the interaction can proceed, its components need to be authenticated. Each zero trust architecture implementation will have its own unique required components, with the core set being:

  • User. Authenticate that the user trying to access a network, application, or cloud-based system has the correct permissions. 
  • Application. Verify that the user has the correct permissions for the data or application they are trying to access. 
  • Device. Confirm the user is connecting to the resource using a device authorized to access the network and application. 
  • Posture. Check the device used to confirm it has the necessary updates, patches, and encryption to access the network and application securely.

The shift to zero trust is also happening in the public sector—most notably within the U.S. federal government. The 2021 Executive Order on Improving the Nation’s Cybersecurity includes multiple mandates, from moving to secure cloud-based solutions to advancing towards zero trust architecture for all government infrastructure.

Organizations that sell to or support federal agencies must ensure they meet zero trust standards as those agencies upgrade their security and infrastructure. 

Challenges with implementing zero trust

With growing threats and attack vectors, implementing zero trust across your organization is an imperative. But even with its numerous advantages over traditional security, there are challenges with implementing zero trust in existing infrastructure.

First, existing infrastructure can consist of multiple solutions from different vendors. While most vendors have made strides to adopt zero trust architecture principles, not every system offers interoperability with systems from other vendors. Inconsistent public cloud experiences from hyperscalers makes securing environments more complex.

Internal teams—from SysOps to NetOps—can experience issues where solutions are not operating in concert with each other. Or worse, disconnected teams and systems can cause breaks in threat detection when there are interoperability issues. 

Second, zero trust requires a significant shift in how leaders think about and treat security. Moving from a castle and moat to a deny-by-default mindset means leaders have to commit their organization to upholding zero trust principles and practices, even when they appear to be getting in the way. Without this commitment, teams can often revert to legacy practices or even create separate “shadow IT” offerings that circumvent zero trust architecture, policies, and processes.

New to Ansible?

Learn how to automate across your business so your team can focus on apps, not ops.

Datasheet: Red Hat Ansible Automation Platform

E-book: Network automation for everyone with Ansible

03 How to build a strong security foundation with zero trust architecture

Traditional security approaches like VPNs with physical or digital tokens were created to provide a secure remote path to an on-premise network. Often referred to as the castle-and-moat network security model, the focus was solely on one entry point which opened the door to all resources on the other side. 

In physical security, the analogy would be keycard access to buildings or secure areas within buildings. An organization may feel like they have physical security using role-based security for employees to enter the building or move around to various areas. But that physical security can fail if a bad actor employs a social engineering hack such as pretending to be a delivery person and being waved through by building security personnel.

Zero trust is the core, not an add-on

Zero trust principals start with making security a foundational component of all projects, whether developing new products or implementing new infrastructure. Instead of building security around network access, zero trust architecture is applied to every interaction as a practice across the organization.

Where to start with zero trust

Implementing zero trust doesn’t start with selecting vendors or migrating security platforms. Instead, organizations need to ask a simple question that has significant implications for their zero trust strategies—what data, applications, or systems are they trying to protect?

  1. Build an inventory. Understanding what is being protected gives organizations a baseline for creating the network, user, application, and workload rules and policies of their zero trust implementation. This baseline also provides SysOps, NetOps, and InfoSec teams with what analytics and analysis tools are needed to discover, identify, and react to security incidents.
  2. Develop your processes and policies. Once an organization has a clear view of what they are protecting, internal teams can work together to create zero trust processes and policies that enable employees to securely get their work.
  3. Test. Modify. Deploy. Ideas on paper can often work out differently when implemented. Seeing processes and policies in the real-world provides operations, networking, and security teams with the necessary feedback to make zero trust work for the entire organization.

Starting by understanding what is being protected is the foundation for scaling zero trust through automation.

04 Scaling zero trust with automation

Zero trust architecture demands that assets including devices, data, and applications are protected the same way wherever they exist. For example, if a workload is moved from an on-premise datacenter to a private or public cloud, zero trust architecture requires the same security management rules to be applied. With zero trust architecture, the decisions are abstracted from the workload itself so the actual code doesn't change.

Across large organizations or rapidly growing businesses, leveraging automation can help scale their policies, rules, and processes as new tools or infrastructure are introduced. Before we look at how Red Hat® Ansible® Automation Platform delivers automation for the zero trust architecture, here are five advantages of automating zero trust.

  1. Know what you’re protecting. Understanding what is being protected is the key to scaling zero trust across an organization’s devices, network, and applications. Automation helps organizations to track and log these assets across multiple locations and in the cloud.
  2. Always-on compliance. The use of bots and other automation tools by cyber criminals creates a need for a security system that is always looking out for threats. Automating zero trust ensures that policies are enforced 24 hours a day, 365 days a year. 
  3. Reduced risk. InfoSec teams can adopt policies and rules as security incidents occur. These processes can then be codified as workflows and executed using automation, reducing the risk of an admin making a human error when implementing a change.
  4. Improved responsiveness. The longer a security risk is not responded to, the more potential for a breach or cyberattack. Automating zero trust empowers organizations to respond quickly, whether there are 1,000 users or 100,000 users, by creating automated actions that can be executed on-demand or by event-driven automation.
  5. Fast prototyping. Automation allows organizations to prototype, test, and implement changes to the security framework, regardless of how complex the framework is. 

05 Zero trust automation goes beyond security

Extending zero trust beyond networking and security allows organizations to truly make security the foundation of every project and system. Automating these processes pushes the value of zero trust even further by ensuring policies and processes are applied and inspected to reduce the risk of cyberattacks or other breaches.

Consistent security and compliance

Ansible and similar tools can help enforce security and compliance rules automatically by managing configurations, applications deployment, and compliance checks that feed into development processes. Organizations can automate provisioning, configuration, application deployment, and other areas. 

Automation does more than secure applications and components. It can also be used to maintain those components and provide regular compliance checks and verification. It’s end-to-end continuous enforcement of security posture for an organization’s continuous integration and continuous development (CI/CD) life cycle. 

Holistic software security

Zero trust principles can also be applied to software and systems inside an organization. Teams and departments often require different applications, hardware, and solutions that don’t have out-of-the-box interoperability. Automation can help integrate multiple systems from different vendors by enabling the creation of automation workflows to orchestrate efficient and secure interoperability.

Even more critical, internally and externally developed solutions may include open source components that, if not monitored for vulnerabilities, could create a new attack vector for cybercriminals. The same automations created to manage interoperability can be employed to keep applications in the correct secure state.

Compliance automation 

Automation can be used to reduce human error in compliance-related tasks. One example is an organization that processes credit card transactions. Multiple processes and hardware and software reviews need to occur to audit Payment Card Industry Data Security Standard (PCI DSS) compliance. These audits also require timely and accurate data from these multiple systems. Automation can be employed instead of having an employee or team monitoring these processes to reduce human error and free up employee time for other more strategic projects. 

Build security into your software pipeline with DevSecOps practices.

Learn more about DevSecOps >>

06 Automating zero trust and more with Red Hat Ansible Automation Platform

Zero trust works when organizations have clear visibility wherever a transaction occurs. Red Hat Ansible Automation Platform brings zero trust and other automation capabilities to your organization. The platform provides a quick return on investment by lowering barriers to automation across security, networking, application, cloud, and edge computing. 

Zero trust practice

Red Hat Ansible Automation Platform zero trust automation solution

Zero trust uses a deny-by-default approach.

Red Hat Ansible Automation Platform allows administrators to enforce access controls to assign permissions, privileges, and roles to users. It also automates encryption—including Mutual Transport Layer Security (mTLS), audit trails, and inventory controls. 

Zero trust uses authorization policies to restrict access to applications or resources.

Red Hat Insights for Ansible Automation Platform can help organizations monitor and identify failures or potential risks where SysOps or NetOps team intervention could be required. 

Zero trust ensures resources are patched before being accessed.

Red Hat Ansible Automation Platform ensures that security patches and updates are applied to application resources across an organization’s infrastructure. 

Red Hat Ansible Automation Platform is the connective tissue that brings together disparate technologies that otherwise don’t communicate well with one another. There are over 100 Red Hat Certified Content Collections—supported by Red Hat and our partners—available to provide consistent automation across all infrastructure components, whether they’re hybrid, cloud, or on-premise.

07 Ready to start your zero trust automation journey?

Red Hat Consulting can help you on your automation journey to adopt zero trust.  Learn more about IT automation and explore how Red Hat experts can help you keep your options open and focus on apps, not ops.

Take an IT automation self-assessment 

Contact the Red Hat Consulting team

Sign up for a Red Hat Ansible Automation Platform trial

Learn more about Ansible automation for security

Video: Ansible automation for zero trust

Ready to get started?

See Ansible Automation Platform pricing >>

Sign up for an Ansible Automation Platform trial >>

Demo video: Ansible Security Automation Demo Red Hat
  1. “Cost of a data breach report 2021”, IBM, accessed 16 June 2022.

  2. “2022 Data Breach Investigations Report”, Verizon, accessed 16 June 2022.

Tags:Automation and management

Red Hat logoLinkedInYouTubeFacebookX

Products & portfolios

  • Red Hat AI
  • Red Hat Enterprise Linux
  • Red Hat OpenShift
  • Red Hat Ansible Automation Platform
  • Cloud services
  • See all products

Tools

  • Training and certification
  • My account
  • Customer support
  • Developer resources
  • Find a partner
  • Red Hat Ecosystem Catalog
  • Documentation

Try, buy, & sell

  • Product trial center
  • Red Hat Store
  • Buy online (Japan)
  • Console

Communicate

  • Contact sales
  • Contact customer service
  • Contact training
  • Social

About Red Hat

Red Hat is an open hybrid cloud technology leader, delivering a consistent, comprehensive foundation for transformative IT and artificial intelligence (AI) applications in the enterprise. As a trusted adviser to the Fortune 500, Red Hat offers cloud, developer, Linux, automation, and application platform technologies, as well as award-winning services.

  • Our company
  • How we work
  • Customer success stories
  • Analyst relations
  • Newsroom
  • Open source commitments
  • Our social impact
  • Jobs

Select a language

  • 简体中文
  • English
  • Français
  • Deutsch
  • Italiano
  • 日本語
  • 한국어
  • Português
  • Español

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility