7 zero-trust misconceptions that every agency should know

 

Connecting state and local government leaders

To ensure successful transitions to the dynamic, but controlled, zero-trust environments, agencies should fully understand the complexities of the technologies and the key role of visibility.

Zero trust has rapidly become the most discussed security term of late, garnering more attention from the rise of ransomware and President Joe Biden's Executive Order on Cybersecurity. The rush to zero trust has also generated confusion about its implementation. To help, the Cybersecurity Infrastructure and Security Agency released the draft zero-trust maturity model, and the Office of Management and Budget published the federal Zero Trust Strategy to provide technical guidance for agencies. While these documents lay out a solid roadmap, there are still a number of misconceptions about zero trust that agencies should avoid if they want to ensure successful transitions.

Misconception #1:  Zero trust is a product from a vendor that can be implemented in a single project.

Zero trust is a long-term, never-ending journey. Known in modern computing terms as a lifecycle, achieving a zero-trust architecture is a long-term process implemented through a phased approach. Most ZTA frameworks and maturity models rely on the National Institute of Standards and Technology’s Cybersecurity Framework for guidance -- but even then, many agencies do not know where to start. The task might feel overwhelming, as agencies might have just partial pieces of the puzzle.

Misconception #2: Zero trust is predominantly focused on end-user access privileges.

While end-user access privileges is one component of zero trust, equally important are understanding and verifying system, service and function identities, including applications, workloads and devices (such as internet-of-things), that can gain access to applications and data maliciously. Identity systems of record easily become outdated or inaccurate as users are on-boarded, leave the organization or switch groups, gaining inappropriate permissions along the way. Agencies must have a way to discover and validate identities in use across the environment to validate the identity system of records and build appropriate zero-trust access policies.

Misconception #3: Zero-trust security can be defined once assets are identified.

Asset identification is only one step in defining zero-trust security policies. Agencies must understand the dependencies and relationships among entities and assets and be able to maintain that visibility in near real time, dynamically. When maintaining ZTA, access policies become even more granular, evolving from a traditional flat network topology to macro-segmentation of networks with micro-perimeters around applications. Machine learning and real-time risk analysis and threat prevention will become a necessity. So will the use of automation to continuously map dependencies and interconnections among applications and assets to baseline interaction behavior to enforce security policies and detect anomalies, violations and incidents.

Misconception #4: Application environments are homogenous.

Large federal agencies with mission-critical functions often use multiple generations of software functions executing across mainframes, through high IO computers delivering database operations to virtualized and software-defined estates as well as cloud-based infrastructure-, platform-, software- and function-as-a service solutions. Applying zero-trust principles to this heterogeneous collection of services further increases the challenge. To approach this challenge, agencies should first focus on cloud environments, where the software functions are temporal and dynamic, or adopt a management plane that can discover and map flows across heterogeneous environments.

Misconception #5: Zero trust is an all-or-nothing approach.

Any zero-trust implementation requiring the broad migration to a new environment or universal deployment of a new set of agents is destined for failure -- or at least an incredibly expensive and complex path to value. Instead, successful implementation requires a well-defined and controlled use case at the start, and then broader adoption via a phased approach. Starting with critical applications inside the network perimeter can be one place to start.

Misconception #6: Agencies should select the “best” and most established solutions for today’s needs.

Anticipating future needs is critical on the zero-trust journey. In a few years, the majority of workloads will be hosted in public cloud environments, and agencies will need to adapt accordingly, without deploying new agents that can create dual policy conflicts that can quickly lead to failure. Many existing security policies and analytics solutions that were created for on-premises perimeter defense may not be as relevant in a dynamic cloud-native world. 

Misconception #7:  Zero-trust deployments should be hard. But at least it’s “fire and forget.”

Zero trust is challenging and should be achieved gradually.  Agencies should adopt an agile approach that requires little up-front investment and delivers initial results fast, whether that is gaining better visibility by uncovering unknown identities or assets, or by segmenting a critical application. This is achieved best with an agentless solution that leverages infrastructure already in place.

Zero trust is here to stay, and the initial deployment is only the first step in the journey. For many agencies, it will be a phased transition into a brave new more dynamic, but controlled, world.  Steering clear of the now common misconceptions about ZTA and having a firm understanding of the critical role visibility plays is key.  With government focus on security increasing, leveraging the zero-trust guidance and frameworks available is one of the best ways agencies can quickly realize success.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.