Is Zero Trust Feasible or Aspirational?
Microsoft

Is Zero Trust Feasible or Aspirational?

Zero Trust (ZT) is a cybersecurity model that assumes no user or system is trusted by default, whether inside or outside the network. It requires rigorous, ongoing identity verification for every person and device active on a network.

ZT is feasible because:

  • Technology Enablement: Modern technologies and tools, such as multi-factor authentication, micro-segmentation, identity and access management, and endpoint security, make implementing ZT possible.
  • Incremental Implementation: Organizations can adopt ZT gradually, starting with critical assets and expanding over time.
  • Industry Adoption: Many organizations, especially those in regulated industries like finance and healthcare, successfully implement ZT principles to enhance their security position.

ZT is aspirational because:

  • Total Security: ZT represents a highly sophisticated security model aiming for rigorous access controls, continuous verification, and least privilege principles.
  • Complexity and Cost: Implementing ZT is highly complex and costly, requiring significant investment and changes to existing infrastructure.
  • Continuous Management: ZT is not a one-time setup but an ongoing process requiring continuous monitoring.

While ZT is an ambitious goal, I believe that it is achievable with the right strategy, technology, investment, and commitment. ZT's principles are worth both implementing - and aspiring to.

DM me if you would like to discuss further.


Philip Griffiths

Open source zero trust networking

7 个月

Good insights. I think it is more feasible than aspiration, but it can require a lot of investment. Therefore, the question becomes, how can we reduce that investment and make a more secure by default environment. For me, this is where solutions such as (which just so happen to be 'free' & open source) OpenZiti (https://openziti.io/) come in. It provides a zero trust network overlay which can be applied to almost any use case and stops external network attacks. It even includes SDKs so that ZTN can be part of the SDLC and make IP attacks completely impossible.

要查看或添加评论,请登录

Derrick Sturisky的更多文章

  • Cloud Provider Security Platforms

    Cloud Provider Security Platforms

    AWS, Google Cloud, and Microsoft Azure all offer unique, robust security architectures. Integrated Security Management:…

    1 条评论
  • Role of the Chief Information Security Officer

    Role of the Chief Information Security Officer

    The Chief Information Officer (CISO) oversees and manages the organization's overall information security program…

  • Role of Corporate Communications During a Cyber Breach

    Role of Corporate Communications During a Cyber Breach

    Before, during, and after a cyber breach, Corporate Communications support the organization in the following key areas:…

  • ZERO TRUST FINAL THOUGHTS

    ZERO TRUST FINAL THOUGHTS

    Zero Trust (ZT) is a cybersecurity model that assumes no user, process, or system is trusted inside or outside the…

    1 条评论
  • How Artificial Intelligence Supports Zero Trust

    How Artificial Intelligence Supports Zero Trust

    Artificial Intelligence (AI) can significantly enhance and enable Zero Trust (ZT) in several important ways: Behavioral…

    1 条评论
  • How Post-Quantum Cryptography Supports Zero Trust

    How Post-Quantum Cryptography Supports Zero Trust

    Post-Quantum Cryptography (PQC) supports Zero Trust (ZT) by reducing the cybersecurity risk that quantum computers pose…

    1 条评论
  • Principles of Zero Trust

    Principles of Zero Trust

    Zero Trust (ZT) is a cybersecurity model that assumes no user, process, or system is trusted inside or outside the…

    2 条评论
  • Business Continuity Plans

    Business Continuity Plans

    Coincidentally, now may be a very good time to re-emphasize the importance for organizations to maintain robust…

  • Developing Markets for Nascent Technologies

    Developing Markets for Nascent Technologies

    Certain nascent technologies offer significant, transformational potential in the public and private sectors. However…

    1 条评论

社区洞察

其他会员也浏览了