The Zero Trust journey

Aug. 30, 2023
Implementing a successful Zero Trust Framework is key to safeguarding your critical data

Security leaders and their businesses need to constantly be prepared for new cyber threats. In fact, according to a recent survey, spending on cybersecurity in the first quarter of 2023 grew to $18.6 billion worldwide, a 12.5% increase since 2022. It’s not only the number of cyberattacks that are on the rise but also the accuracy and sophistication of these attacks leading to more successful and large-scale breaches that have organizations looking at cybersecurity through a more holistic and comprehensive lens to establish a more proactive defense.

The fundamentals of data security, access management, verifiable identities and strong encryption have never been more critical. As we continue to see data breaches increase, enterprises need to ensure their security strategy is future-proof and that the entire organization understands their security impact. Today, we are seeing more discussions and implementation around a new strategy, Zero Trust, that changes their perspective and views cybersecurity in a new way. And while this trending topic is top of mind across conferences and thought leaders - what does it really mean to have a Zero Trust strategy, and where should companies start?

State of Zero Trust and Cybersecurity

According to IBM, 83% of organizations surveyed have experienced more than one data breach, and 59% of these organizations didn’t have a Zero Trust strategy in place. For CIOs and their enterprises, traditionally the approach has been to lock digital entrances with firewalls to keep out threats. But today, CIOs and CISOs need to change their perspective and view cybersecurity in a new way - assuming the bad actor is already in the system and focusing on protecting their organization from a bad actor’s movements inside their operations. A Zero Trust approach helps ensure organizations can defend against and mitigate damage in the event of an eventual breach.

In the years coming out of the pandemic, security teams are still tackling challenges as a result of our rapid move to a digital, hybrid landscape. The potential cybersecurity threat landscape has rapidly grown as we moved data to the cloud and expanded hybrid work and remote work. Organizations have had to create new strategies to address these changes to protect sensitive systems and information while still allowing for enabling business growth to improve operational and business efficiency.

Zero Trust approaches are reshaping security in this perimeter-less, hybrid world. In fact, while only 1% have this framework in place, Gartner predicts that by 2026, 10% of large enterprises will have a mature, measurable Zero Trust program.

Why Zero Trust?

In 2022, the White House issued a mandate to implement Zero Trust frameworks for all government systems, and with CISA’s latest Zero Trust Maturity Model, government agencies and enterprises have a blueprint for planning out Zero Trust frameworks in their own organizations.

The CISA model outlines five distinct pillars: identity, devices, networks, applications and workloads and data. It establishes that there is no one solution to get to Zero Trust maturity - the implementation will take strategic backing, time, and investment. This model features four stages of maturity an organization must work through, and the model is not linear. Each organization will start at a different place based on its own capabilities and objectives.

The Zero Trust strategy extends beyond secure identities across users, applications, devices, machines, and workloads: it’s a comprehensive data security strategy for encrypting data at rest and in transit, spanning public and private cloud environments. Key to this approach is ensuring that you’re granting access to verified and authorized individuals when they need it. Applying those policies consistently can better protect your organization, no matter where the threat is arising from.

Zero Trust is based on the concept of “Never Trust, Always Verify” and has three key principles namely - Verify Explicitly, Least Privilege Access and Assume Breach:

Verify Explicitly: Ensuring only verified and authorized users have access to the data and resources they need, can help protect against remote-based account takeover (ATO) attacks.

o   Least Privilege Access: Access to data and resources is segmented based on role and responsibilities. High-value assets are secured by multiple layers of security, and key infrastructure, like servers and laptops, are encrypted and set up with appropriate backup and disaster recovery processes.

When done correctly, Zero Trust security can prepare enterprises for current and future threats.

About the author: Bhagwat Swaroop is President of Digital Security Solutions at Entrust, where he leads the evolution and growth of solutions that are foundational for enabling crucial enterprise security initiatives, including Zero Trust architectures supported by identity and data security.

Swaroop has more than 20 years of leadership experience driving growth in global high-tech companies. Prior to joining Entrust, he was President and General Manager of One Identity, a cloud-based cybersecurity company. Previously, Swaroop was Executive Vice President and General Manager of Proofpoint, leading the company’s email security business; and led the Enterprise Security Solutions product management and product marketing teams at Symantec. He also has held leadership positions at NetApp, McKinsey, and Intel.

Courtesy of --Copyright: Olivier Le Moal
In the twelve years since its inception, zero trust has undergone a transformation from a cybersecurity nice-to-have to a standard best practice.
Courtesy of -- Copyright: World Image
Keep in mind that many threat actors deploy initial payloads of malware simply as a steppingstone to targeting more valuable sensitive data.