Zero Trust with Cisco Meraki

jOMeraki2
Getting noticed

Zero Trust with Cisco Meraki

Hello Community,

I’ve been looking into implementing Zero Trust with Cisco Meraki, and I actually went through the Cisco “What is SASE?” module on the developer site. Cisco DevNet But I felt it was somewhat abstract and didn’t get a clear picture of how to actually apply Zero Trust in a real-world Meraki deployment.

So I’d like to ask:

In general, what are the essential components and integrations needed (Meraki MX, MR, Systems Manager, Umbrella, Azure AD, Duo, etc.)?

 

Has anyone here deployed Zero Trust using Meraki and can share their architecture, lessons learned, or pitfalls?

Is there a trial or demo setup I can try to see how it works in practice before deep diving?

Thanks in advance for your insights!

2 Replies 2
alemabrahao
Kind of a big deal
Kind of a big deal

BRKMER-1005

 

Solutions - Cisco Zero Trust Architecture Guide - Cisco

 

Cisco Meraki Free Trial Request Form | Cisco Meraki

I am not a Cisco Meraki employee. My suggestions are based on documentation of Meraki best practices and day-to-day experience.

Please, if this post was useful, leave your kudos and mark it as solved.
PhilipDAth
Kind of a big deal
Kind of a big deal

This is all my personal opinion.  Others will have a different view on this.

 

It's a broad subject. To me, it means not trusting the device, user or networking they are using.  Zero trust.

 

You then profile the device, the user, and consider what network they are using to come up with a risk profile, and then grant access based on that.

 

Because of this, there isn't "one solution".  It is a collection of technologies and solutions you form together into a jigsaw puzzle.

This is why when you "Google" the subject, you get broad, vague conceptual responses.  It's like asking, "What is wrong with my country?".

 

Personally, I think Cisco SecureConnect is a great solution for quick broad coverage.

https://documentation.meraki.com/CiscoPlusSecureConnect

 

Cisco ISE can also be used as another part of the jigsaw puzzle.

 

Zero Trust also encompasses technologies like XDR, application access, identity management, access management, endpoint patch management, and anything that contributes to or affects the "risk" ("risk" is another word for "Trust").

Get notified when there are additional replies to this discussion.