1. What does zero trust mean for our organization?
Bigger than a singular technology, it reflects a security paradigm through which any organization can approach and strengthen their cybersecurity program. Put simply, zero trust isn’t rocket science: it’s access. And it will look different from one organization to the next.
Think about the ways in which you interact with your own enterprise infrastructure. On any given day, you head into the office, connect to WiFi or plug into a port. Or perhaps you decide to work from home using remote access technologies. Chances are you deploy virtual desktop environments — and probably, a variety of them. Taken together, these scenarios reflect the many different ways the enterprise allows you to access its resources. The question is, are the right controls in place — and consistently applied — to safeguard that wherever, whenever access?
Getting to the heart of what zero trust means for an organization requires the enterprise to think through how it verifies user and asset identity, as well as the posture of the endpoint. It means considering how the business applies controls to the network flows that are least privileged, as well as where (i.e., at the perimeter, deep in the data centre, or not at all). Also important: assessing whether threat inspection for allowed network flows are being applied and running through these checks for every single way a person can access any enterprise resource.
With those core capabilities defined, organizations can cut out just about anything else that overcomplicates the objectives of zero trust to instead focus on the well-defined requirements that form the basis for zero trust analysis, conceptual models, comprehensive designs and practical implementation.
Start thinking about your business requirements and what you want the zero trust solution to provide in terms of business value. Work through legal, regulatory or privacy requirements the design should address. Cast a broad net to identify all user types, consolidate their shared requirements and build patterns that align to zero trust principles. Explore which existing policies and standards should be incorporated. Remember to outline budget allocation, skill requirements and operational considerations at this stage of the planning discussion.
2. How do we bring stakeholders on board to the zero trust business case?
Selling zero trust to stakeholders requires you to showcase the ways this approach can maximize business value. Keep in mind: this is an evolving space. Your leadership may not necessarily understand the benefits of zero trust. Obtaining adequate funding, or avoiding internal friction, may be difficult — but the right strategy means it’s certainly possible.
The key lies in your ability to ensure stakeholders understand what zero trust means, how it can be applied and, important, what outcomes they can expect. You’re going to need to illustrate the multidisciplinary nature of implementing zero trust controls and highlight the importance of integrating networking, network security, identity access management, continual posture assessments and automated response through a seamless execution plan to deliver maximum results.
Showcasing the threats and threat actors the organization is up against can be a good way to underline the benefits zero trust brings. Drawing a clear mapping to your cybersecurity program’s key performance and key risk indicators will be important. This is how you start to show the tangible improvements zero trust can bring, provide transparency and emphasize the importance of continually improving a cybersecurity program like this. Synergizing the zero trust approach with other programs — such as work-from-anywhere flexibility or insider threats — can help you fully illustrate the benefits of zero trust to help bring key stakeholders on board.