Divya Internship 8 Final
Divya Internship 8 Final
Divya Internship 8 Final
Bachelor of Technology
in
COMPUTER SCIENCE AND E N G I N E E R I N G
by
MAHANTHI DIVYA
(21KD1A05A2)
This report on “Zscaler Zero Trust Cloud Security” is a bonafide record of the internship
work submitted by MAHANTHI DIVYA with Reg. No 21KD1A05A2, in her 7th semester in
partial fulfillment of the requirements for the award of degree of B.Tech in Computer Science and
I would like to express my deep sense of gratitude to my esteemed institute Lendi Institute
of Engineering and Technology (Autonomous), which has provided me an opportunity to fulfill my
cherished desire.
I am highly indebted to Dr. Rama Rao Adimalla, Professor - Head of the Department of
Computer Science and Engineering, Lendi Institute of Engineering and Technology
(Autonomous), for giving me the opportunity to do the internship in college.
I express my sincere thanks to Principal, Dr. V. V Rama Reddy, Lendi Institute of
Engineering and Technology (Autonomous) for his encouragement to me during this Internship,
giving me a chance to explore and learn new technologies in the form of summer Internship-2.
I am grateful for EDUSKILLS and AICTE for providing me this learning opportunity.
Finally, I am indebted to the teaching and non-teaching staff of the Computer Science and
Engineering Department for all their support in completion of my internship.
MAHANTHI DIVYA
(21KD1A05A2)
iii
CERTIFICATE
INSTITUTE
VISION
Producing globally competent and quality technocrats with human values for the holistic needs of
industry and society.
MISSION
Creating an outstanding infrastructure and platform for enhancement of skills, knowledge
and behavior of students towards employment and higher studies.
Providing a healthy environment for research, development and entrepreneurship, to meet
the expectations of industry and society.
Transforming the graduates to contribute to the socio-economic development and welfare
Of the society through value based education.
v
Department of Computer Science & Engineering
VISION
MISSION
PEO1:Graduates shall have strong foundation in core and allied Electrical and Electronics
Engineering, in sciences and mathematics, to become globally competent in designing, modeling
and critical problem solving.
PEO2: Graduates shall involve in research activities in the field of electrical and electronics
engineering through life long learning and provide solutions to engineering problems for
sustainable development of society.
PEO3: Graduates shall have good communication skills and socio-ethical values for getting
employment or higher studies by excelling in competitive examinations and be able to work in
supportive and leadership roles.
v
Department of Computer Science & Engineering
vi
PO10: Communication Skills: Communicate effectively on complex engineering activities with
the engineering community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and receive
clear instructions.
PO11:Project Management &Finance: Demonstrate knowledge and understanding of the
engineering and management principles and apply these to one’s own work, as a member and
leader in a team, to manage projects and in multi disciplinary environments
PO12:Life Long Learning: Recognize the need for, and have the preparation and ability to engage
in independent and life-long learning in the broadest context of technological change.
PROGRAMSPECIFICOUTCOMES (PSOs)
PSO1: Capable of design, develop, test, verify and implement electrical and electronics
engineering systems and products.
PSO2: Succeed in national and international competitive examinations for successful higher
studies and employment
vii
Department of Computer Science & Engineering
COURSE OUTCOMES
S.No Description
CO1 Construct the company profile by compiling the brief history, management
structure, products / services offered, key achievements and market
performance of internship organization.
CO4 Apply various soft skills such as time management, positive attitude and
communication skills during performance of the tasks assigned in internship
organization.
ABOUT APSCHE
The State Government has accordingly decided to fill the gap by constituting a State
Council of Higher Education as recommended in the National Educational Policy of the
Government of India and as recommended by the committee formed by the UGC.
Thus, the A P State Council of Higher Education (APSCHE) came into existence w.e.f.
20.05.1988 through Act 16 of 1988 to advise the Government in matters relating to
Higher Education in the State and to oversee its development with perspective planning.
PAGE
S.NO TITLE
NUMBER
1. Introduction 1
4. Zscaler fundamentals 6
5. Zscaler discovery 7
8. Applications 12
13. Conclusion 20
14. Reference 21
INTRODUCTION
Today man is able to send and receive any form of data may be an e-mail or an audio or
video just by the click of a button but did he ever think how securely his data id being
transmitted or sent to the other person safely without any leakage of information. Today
Internet is the fastest growing infrastructure in everyday life. In today’s technical
environment many latest technologies are changing the face of the mankind . But due to
these emerging technologies we are unable to safeguard our private information in a very
effective way and hence these days cybercrimes are increasing day by day. Today more than
60 percent of total commercial transactions are done online, so this field required a high
quality of security for transparent and best transactions. Hence cyber security has become a
latest issue. The scope of cyber security is not just limited to securing the information in IT
industry but also to various other fields like cyber space etc. Even the latest technologies like
cloud computing, mobile computing, E-commerce, net banking etc also needs high level of
security. Since these technologies hold some important information regarding a person their
security has become a must thing. Enhancing cyber security and protecting critical
information infrastructures are essential to each nation's security and economic wellbeing.
Making the Internet safer (and protecting Internet users) has become integral to the
development of new services as well as governmental policy. The fight against cybercrime
needs a comprehensive and a safer approach. Given that technical measures alone cannot
prevent any crime, it is critical that law enforcement agencies are allowed to investigate and
prosecute cybercrime effectively. Today many nations and governments are imposing strict
laws on cyber securities in order to prevent the loss of some important information. Every
individual must also be trained on this cyber security and save themselves from these
increasing cybercrimes.
21KD1A05A2
1
21KD1A05A2
Overview of Zscaler’s Zero Trust Architecture:
21KD1A05A2
Minimizing the Attack Surface
3
21KD1A05A2
Zscaler Zero Trust Cloud Security Platform:
Zscaler Zero Trust Cloud Security is a comprehensive framework designed to
redefine how organizations safeguard their data and applications in a cloud-centric
environment. By adopting a Zero Trust approach, Zscaler eliminates implicit trust
for any user or device, ensuring enhanced security across all access points. The
platform operates on three key principles: Never Trust, Always Verify, which
involves authenticating and authorizing every access request based on user identity,
device health, and contextual information; User-Centric Security, which prioritizes
securing users and their connections to applications rather than the network itself,
thereby protecting sensitive data from unauthorized access; and Cloud-Native
Architecture, which provides scalability and flexibility through a platform built for
the cloud, eliminating the need for on-premises hardware.
21KD1A05A2
4
21KD1A05A2
3. Advanced Threat Protection
Includes features like malware scanning and phishing protection to defend
against cyber threats in real-time.
5
21KD1A05A2
21KD1A05A2
Zscaler Fundamentals:
Never Trust, Always Verify: Zscaler operates on the premise that no user or
device should be trusted by default. Every access request is authenticated and
authorized based on identity, context, and device health.
Micro-Segmentation: Access to applications is restricted to only those users
who need it, minimizing the attack surface.
2. Cloud-Native Architecture
6
21KD1A05A2
Zscaler Discovery:
Zscaler Discovery is a feature within the Zscaler platform that helps organizations
gain visibility into their network traffic and applications. It plays a crucial role in
understanding user behavior, application usage, and potential security risks.
1.Traffic Visibility
2. Application Discovery
Identify Shadow IT: The tool helps identify unauthorized applications being
used within the organization, which can pose security risks.
Application Risk Assessment: Organizations can assess the risk associated
with various applications based on usage patterns and security posture.
3. Data Classification
21KD1A05A2
Zscaler Analysis:
21KD1A05A2
3. Application Performance Insights
Description: Analyzes the performance of applications accessed through
Zscaler, including latency and downtime.
Visualization:
Area Charts: Show application response times over a period, highlighting
any spikes in latency.
Scatter Plots: Compare application performance across different
geographic locations.
9
21KD1A05A2
Zscaler Implementation:
3. Deployment Preparation
User Segmentation: Classify users based on roles, locations, and access needs.
This helps in applying tailored security policies.
Policy Development: Create security policies based on user roles, applications, and
data sensitivity. Consider DLP, access controls, and threat protection policies.
Integration Planning: Plan for integration with existing identity providers (IdP),
SIEM systems, and other security tools.
4. Implementation
Initial Configuration: Set up Zscaler accounts and configure the necessary settings
in the Zscaler admin portal.
Traffic Forwarding: Implement traffic forwarding methods, such as:
GRE Tunneling: For routing traffic from on-premises networks.
VPN Configuration: For remote users to connect securely.
Proxy Configuration: For web traffic redirection.
Testing: Conduct thorough testing of the configuration to ensure that traffic is
being routed correctly and that policies are being enforced.
10
21KD1A05A2
5. User Onboarding and Training
User Communication: Inform users about the changes, including the benefits
of the new system and any changes in access methods.
Training Sessions: Conduct training for users and IT staff on how to use
Zscaler effectively, including troubleshooting common issues.
7. Continuous Improvement
Regular Reviews: Periodically review security policies, user access,
and application performance to ensure they remain effective.
Stay Updated: Keep abreast of Zscaler updates, new features, and best practices
to continually enhance security measures.
11
21KD1A05A2
Applications:
Zscaler offers a range of applications designed to enhance security and improve user
experience in cloud environments. Below is a summary of key Zscaler applications
along with their functionalities and user feedback.
Functionality:
Providessecure access to the internet and internal applications.
Ensures that all traffic is routed through Zscaler’s cloud for inspection and
policy enforcement.
Supports both VPN and direct-to-cloud access.
Recent Updates:
Fixed issues related to VPN connection icons and network errors during
authentication.
Improved handling of network changes, ensuring smoother transitions between Wi-
Fi and cellular data.
User Feedback:
Some users report persistent connection issues, such as the VPN showing as
connected even when it is not.
Others have experienced difficulties with Wi-Fi connectivity when using the app,
leading to frustration.
Functionality:
Acts as a secure web gateway, protecting users from web-based threats.
Provides visibility and control over internet traffic, including data loss
prevention (DLP) and threat protection.
URL filtering, SSL inspection, and advanced threat protection.
Integration with existing security tools and identity providers.
Functionality:
Enables secure access to internal applications without exposing the network.
• Uses a zero-trust model, ensuring that users only access applications they are
authorized to use.
Application segmentation and granular access controls.
Seamless user experience with no need for traditional VPNs.
12
21KD1A05A2
Zscaler Software Key Functions:
Zscaler provides a cloud-based security platform that offers a variety of key functions
designed to enhance security, performance, and user experience for organizations. Below
are the primary functions of Zscaler software, categorized by its main offerings: Zscaler
Internet Access (ZIA) and Zscaler Private Access (ZPA).
ZIA is designed to secure internet access for users, regardless of their location. Its key
functions include:
Secure Web Gateway:
Protects users from web-based threats such as malware, ransomware, and
phishing attacks by inspecting all internet traffic, including SSL/TLS- encrypted
traffic.
URL Filtering:
Provides granular control over web access by categorizing websites into
different risk levels, allowing organizations to block or allow access based on
policies.
SSL Inspection:
Inspects encrypted traffic to detect threats hidden within SSL/TLS sessions,
ensuring comprehensive security without compromising privacy.
Threat Intelligence:
Leverages global threat intelligence to identify and block known malicious
sites and emerging threats in real time.
Bandwidth Control:
Allows organizations to manage bandwidth usage by prioritizing critical
applications and limiting non-essential traffic.
21KD1A05A2
13
21KD1A05A2
2. Zscaler Private Access (ZPA)
Application Segmentation:
Allows organizations to segment applications to minimize lateral movement
and reduce the attack surface within the network.
Application-Level Security:
Protects applications from unauthorized access and attacks, ensuring that
only legitimate users can access sensitive internal resources.
Additional Features
Analytics and Reporting:
Offers comprehensive analytics and reporting tools that provide visibility
into user activity, application performance, and security incidents, helping
organizations make informed decisions.
Integration with Security Ecosystem:
Easily integrates with existing security tools, SIEM systems, and other
infrastructure components to enhance overall security posture.
Global Cloud Infrastructure:
Leverages a global network of data centers to provide low-latency access
and high availability for users around the world.
21KD1A05A2
14
21KD1A05A2
Modules explanation :
15
21KD1A05A2
Cloud Application Visibility and Control:
Function: Offers visibility into cloud application usage and helps
enforce security policies.
Benefits: Ensures secure access to SaaS applications and reduces shadow
IT risks.
Bandwidth Control:
Function: Allows organizations to manage bandwidth usage by
prioritizing critical applications.
Benefits: Optimizes network performance and user experience.
16
21KD1A05A2
3. Additional Features and Modules
Zscaler Digital Experience (ZDX):
Function: Monitors the performance of applications and user experiences
to identify issues.
Benefits: Provides insights into application performance, helping IT
teams troubleshoot issues quickly.
Zscaler Cloud Security Posture Management (CSPM):
Function: Helps organizations manage and secure their cloud environments.
Benefits: Ensures compliance and reduces risks associated
with misconfigurations in cloud services.
Learning Outcomes:
21KD1A05A2
17
21KD1A05A2
5. Monitoring and Reporting:
21KD1A05A2
18
21KD1A05A2
Zscaler Zero Trust Cloud Security: Case Study
Zscaler’s Zero Trust Cloud Security has been implemented by numerous organizations
to secure their digital environments, improve access controls, and support cloud-first,
remote-work strategies. Here’s an example of how Zscaler’s approach transformed
security and network access for a large enterprise.
21KD1A05A2
19
21KD1A05A2
Conclusion:
Computer security is a vast topic that is becoming more important because the
world is becoming highly interconnected, with networks being used to carry out
critical transactions. Cybercrime continues to diverge down different paths with
each New Year that passes and so does the security of the information. The latest
and disruptive technologies, along with the new cyber tools and threats that
come to light each day, are challenging organizations with not only how they
secure their infrastructure, but how they require new platforms and intelligence to
do so. There is no perfect solution for cybercrimes but we should try our level best
to minimize them in order to have a safe and secure future in cyberspace.The
government has a major role to play in stimulating progress toward higher levels
of cybersecurity. Reducing vulnerabilities is the high-leverage area for increasing
cybersecurity. An operations-focused approach is needed. Many government
agencies can be used as best-practice examples of enforcing existing regulations.
Limitations of national cybersecurity strategy are related to interrelations and
interconnections between many actors at many hierarchical levels. Nowhere has
technological development been more dynamic and comprehensive than in the
area of communication and information technology. The focus has always been on
the rapid development and introduction of new services and products, while the
security-related aspects usually had little influence on the broad acceptance of
new technologies.
20
21KD1A05A2
Reference:
21KD1A05A2
21
21KD1A05A2