Zero trust in the public sector
Our effective cyber program assessment and zero trust strategy practices directly translate to business security needs and protect the business applications even when the perimeter is breached and the network is compromised. The following are the crucial steps to consider while devising a zero trust strategy:
- Define the business drivers and objectives that influence security resources
- Assess the current cybersecurity architecture against zero trust maturity models to evaluate the gaps
- Develop a short- and long-term strategic road map for embracing a zero trust architecture incrementally
- Achieve compatibility with the existing service infrastructure and application landscape
- Build business cases to justify the security transformation
We have expanded upon the Department of Homeland Security Cybersecurity & Infrastructure Security Agency (DHS CISA) maturity model to ease the development of a road map to advance zero trust architecture. Specifically, we align the DHS CISA zero trust assessment to the EY cyber program assessment to enable mapping to multiple regulatory requirements (e.g., NIST 800-53), benchmarking against commercial sectors and alignment with “battle-tested” project charters.