The roadmap

The roadmap

This is part V of the ZTA series, if you have not already done so, please bookmark the series so you can get to past and future vlogs

There are three different phases for implementing ZTA within your company.?

The first phase, Traditional, is for companies that have not yet implemented security measures with respect to ZTA - most likely, as you learn more about this ZTA you will realize that you are most likely not in this phase. If you do, we need to talk!!

The second phase, Advanced, is for companies that have some security measures in place. The third and final phase, Optimal, is for companies that have mature security practices.

?As ZTA applies across the five pillars -?

  • Identity
  • Device
  • Network
  • Application and?
  • Data?

- each of these areas may be in a different phase of implementation.?

Traditional:

In traditional systems, there are a lot of manual steps. You have to configure and assign attributes manually. Static security policies are in place, and incident response and mitigation deployment is also done manually. These systems rely on external systems a lot, so they can be very coarse-grained.

Advanced:

Centralized identity control and policy enforcement means that everyone has the same rules to follow. This makes it easier to keep track of what people are doing and to make sure that they are following the rules. Cross pillar coordination means that different parts of the systems work together. Limited automation in incident management means that we use machines to help us, but we still need people to do some of the work. And finally, least-privileged changes based on posture assessments means that we change how much access people have based on how safe we think they are.

Optimal:

The systems can automatically assign attributes to assets and resources. This helps us to give each asset the least amount of privileges it needs to function. We also use open standards so our system can work with other systems. And we keep a record of the system's state at all times, so we can audit what has happened in the past.

No alt text provided for this image
High level view of ZTA Maturity model


So where do you stand overall, or within the pillar which is in your sphere of influence?

In the next episodes, we will discuss these states as they apply to the 5 pillars in the Zero Trust Maturity Model

要查看或添加评论,请登录

社区洞察

其他会员也浏览了