Getting Devices Ready for Zero Trust Architecture by Complying with Richard Bejtlich’s MICCMAC Framework
DOI:
https://doi.org/10.34190/eccws.24.1.3531Keywords:
Zero, trust, miccmac, network, architecture, framework, roadmap, privilege, monitoring, complianceAbstract
In today’s rapidly evolving cybersecurity landscape, the adoption of Zero Trust Architecture (ZTA) has become a crucial strategy for organizations seeking to enhance their security posture and cyber resilience. ZTA operates on the principle of "never trust, always verify", ensuring that every device, user, and network request is continuously authenticated and monitored (Bejtlich, 2013). However, implementing ZTA effectively requires a solid foundation of security principles that govern device configurations, network architecture, and risk mitigation strategies. One such foundational framework is Richard Bejtlich’s Defensible Network Architecture 2.0, encapsulated in the MICCMAC (“mick-mack”) model. This paper explores how organizations can prepare their devices for ZTA by integrating the MICCMAC framework, ensuring comprehensive cybersecurity defense, and minimizing attack surfaces (Bejtlich, 2004).
Downloads
Published
Issue
Section
License
Copyright (c) 2025 European Conference on Cyber Warfare and Security

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.