visit
According to a recent survey, ", "conducted by iSMG, everyone said that Zero Trust is critical to reducing their cybersecurity risk (100% among all respondents chose somewhat to extremely critical).
Also, nearly half of them (46%) said Zero Trust is the most crucial security practice in 2022. of over 300 large organizations by Forrester indicated that 78% of security executives plan to raise their use of Zero Trust in 2022.
places full deployment of Zero Trust at only 6%. Another 30% said Zero Trust in partial deployment or production, and 63% said their Zero Trust projects are now in the assessment, strategy, or pilot phases. So, as a result, despite C-level are planning, most of them are just planning.
If you are looking for an introduction to Zero Trust Architecture:
//gzht888.com/introduction-to-the-zero-trust-security-architecture-a-concept-not-a-product
For example, when it comes to Zero Trust, the NIST that maps relevant Zero Trust components to CSF functions, categories, and subcategories (i.e., NIST SP800–27). These are core Zero Trust components, such as policy engines, administrators, enforcement points.
Another helpful resource is the whitepaper from NIST — , which describes how to leverage CSF and the (SP800–37) to migrate to a Zero Trust Architecture.
Below are some best practices to start.
With Zero Trust, things are a little bit different. According to NIST's , starting from the data and applications - the highest value and highest risk users and assets are recommended. The protection surface is also much smaller than the attack surface or the perimeter, thus easier to defend.
Prioritize what to protect based on criticalness against your business goal. After you implement Zero Trust on one or more non-critical protection surfaces, you may not know all of the applications in your data center when you start, but you know your most critical applications. After that, move on to the next set of protection surfaces on the priority list until you reach your cybersecurity goals.
According to CISA's , before organizations can implement Zero Trust around four enforcement points (identities, devices, networks, applications, and data), they need complete visibility - to understand how everything connects to everything else.
Once they get complete visibility, they can begin to understand what trust and enforcement policies they need. Many essential technologies might already be used and need modernizing with orchestration and policy engines.
Data centers are traditionally good at managing networks and surrounding environments. But according to NIST SP800-207: , a differential segment is how to create a "micro-boundary" in the data center; Only pre-approved traffic flows can pass. This is similar to the allowlist of the legacy system.
In the case of building a Zero Trust Architecture (ZTA), the principle is the same, but the network segment and boundary will be much more miniature. Therefore, the micro-segmentation policy should be de-coupled from the existing network architecture and have the capability to scale at ease.
No matter which framework or model you choose to follow, identity is the foundation of Zero Trust security. It requires pivotal components, such as identity origination and role-based access controls. Identity origination means knowing where all the identities come from. Not only user identities, but also:
Moreover, as the size and shape of our digital footprint are changing, we no longer have a "digital network" or "digital services." Still, we now have a whole "digital ecosystem" that keeps expanding. Suppose we want to remain secure while realizing these new channels or efficiencies or agility. In that case, we need to adopt Zero Trust Architecture — using the lens of identity to see potential risks and inform where we draw the "perimeter."
To efficiently and effectively manage the entire security posture, it makes more sense to have a single, holistic view of organizational identities to determine policy, view posture, enact compliance, and respond to risk.
Among all Zero Trust models - Google's , Gartner's , NIST , and by Forrester, which assumes that being compromised is inevitable. This brings the idea of cyber-resilience, and I would like to finish this article with this concept.
The main difference between Cybersecurity vs. Cyber-Resilience is the focus of response. In cybersecurity, we have DR/ BCP to ensure organizations can resume operations as fast as possible. However, the main focus of cybersecurity is still on preventive controls. In response to this concept, NIST released a special publication , "Developing Cyber Resilient Systems — A Systems Security Engineering Approach." It is the first in a series of specialty publications developed to support — the flagship Systems Security Engineering guideline.
Achieving cyber-resilience is not the endgame but an endless journey. Organizations must push their limits, prepare for the worst, and hopefully, although near to impossible, identify vulnerabilities before adversaries. Like the fighter who will face multiple opponents who take different approaches to beat him, he will spar with those who emulate his upcoming opponent.
Doing all the above does not immediately turn your organization into the most secure one but helps you embrace most executives' security goal in 2023 - Zero Trust Architecture. Today, we have to admit that the question is no longer how to keep bad actors out although this stays important. Instead, the priority should be how to recover as quickly as possible to "business as usual" once an attack occurs.