Reducing Network Reachability: A Practical Approach to Zero Trust
Dr. Victor Monga
Cybersecurity Technologist & Architect | Experienced Practitioner | Public Speaker | Community Leader
In a recent conversation with Snehal Antani , CEO and co-founder of Horizon3.ai, we explored one of the most actionable strategies for improving cybersecurity maturity—reducing network reachability. While #ZeroTrust is often wrapped in buzzwords and vendor promises, Snehal’s practical insights provide a clear roadmap for taking meaningful steps toward reducing risk.
Here are some of the key lessons from our discussion and how they can help you in your #ZeroTrust journey.
Zero Trust Is an Evolution, Not a Product
As Snehal emphasized during our conversation: "Zero Trust isn’t a product; it’s an evolution of your existing security capabilities, processes, and culture."
At its core, Zero Trust is about minimizing risk by reducing reachability—whether it’s network reachability, credential reachability, or device reachability. This shift requires a combination of strong identity management, network segmentation, and continuous validation to make sure your controls are always effective.
Reducing Reachability: Where to Begin
In the conversation, Snehal broke down reachability into three key areas that organizations should focus on:
The goal is clear: reduce how far an attacker can move once they gain access, effectively minimizing the blast radius.
Vulnerable vs. Exploitable: Prioritizing What Matters
Another crucial point Snehal made was the distinction between being vulnerable and being exploitable. Not every vulnerability is an immediate threat. As he explained, context is everything.
For instance, you may have a vulnerable Log4j instance in your environment, but if strong network egress controls prevent external connections, it might not be exploitable. That means you can prioritize fixing truly critical risks and address lower-priority issues during regular maintenance windows.
领英推荐
Continuous Security Validation: An Ongoing Process
Traditional security assessments like annual audits and periodic penetration tests no longer keep pace with today’s dynamic environments. Snehal summed it up perfectly: "For every Patch Tuesday, I want a pen test Wednesday."
Continuous security validation helps verify that your security controls remain effective over time and ensures that your exploitable attack surface keeps shrinking. This approach allows organizations to move beyond simple vulnerability scanning and adopt a more attacker-oriented mindset.
Maximizing Impact with Return on Effort (ROE)
During the discussion, we also tackled one of the most valuable metrics in security—Return on Effort (ROE). Unlike traditional ROI, ROE helps organizations prioritize actions that provide the greatest reduction in risk for the least amount of effort.
As Snehal explained, fixing a single misconfiguration—like enabling SMB signing—can eliminate 80% of exploitable attack paths in some environments. This high-ROE work should be at the top of every security leader’s list.
Final Thoughts: Take a Methodical Approach
Zero Trust isn’t a one-size-fits-all solution, nor is it something you can buy and implement overnight. It’s a continuous journey that evolves as your organization matures.
As Snehal and I discussed, one of the best ways to make progress is to start with high-risk areas, focus on reducing reachability, and continuously measure your improvements. Each step brings you closer to a more resilient security posture.
For more insights like this, check out our full conversation with Snehal Antani at Horizon3.ai.
Listen here: https://ztjourney.com
CEO & Founder @ Enstal Technologies a next-gen reseller
3 周Great post. Surprisingly, so few companies have proper network segmentation from what I see day to day. 8/10 are still on a flat network and there is no NAC in place or firewall segmenting the network.
Great insights on limiting reachability to reduce the blast radius of an attack! ?? Restricting network, credential, and device access is crucial in building a resilient security posture. This breakdown of high-impact fixes provides a practical approach to implementing Zero Trust principles.