Getting Devices Ready for Zero Trust Architecture by Complying with Richard Bejtlich’s MICCMAC Framework

Authors

  • Isaac Ojeh N/A

DOI:

https://doi.org/10.34190/eccws.24.1.3531

Keywords:

Zero, trust, miccmac, network, architecture, framework, roadmap, privilege, monitoring, compliance

Abstract

In today’s rapidly evolving cybersecurity landscape, the adoption of Zero Trust Architecture (ZTA) has become a crucial strategy for organizations seeking to enhance their security posture and cyber resilience. ZTA operates on the principle of "never trust, always verify", ensuring that every device, user, and network request is continuously authenticated and monitored (Bejtlich, 2013). However, implementing ZTA effectively requires a solid foundation of security principles that govern device configurations, network architecture, and risk mitigation strategies. One such foundational framework is Richard Bejtlich’s Defensible Network Architecture 2.0, encapsulated in the MICCMAC (“mick-mack”) model. This paper explores how organizations can prepare their devices for ZTA by integrating the MICCMAC framework, ensuring comprehensive cybersecurity defense, and minimizing attack surfaces (Bejtlich, 2004).

Author Biography

Isaac Ojeh, N/A

Blue Team Jedi experienced in defensible cybersecurity in the technology, academia, and finance industries. Senior security analyst at PayFacto, faculty member at Conestoga College and Fanshawe College. GIAC Advisory Board and ForbesBLK. BSc. WirelessNetworks Security from Université Grenoble Alpes, MS. Cybersecurity and Information Assurance from Western Governors University, 40+ certifications.

Downloads

Published

2025-06-25