Security News > 2021 > June > The 6 steps to implementing zero trust
One of the main concerns preventing businesses from committing to a zero trust model is that "Brownfield" environments have too much technical debt that needs addressing before implementing zero trust.
The true reason for why businesses are hesitant when it comes to zero trust is due to a lack of understanding of the process and the unfortunate influence of the myths stated above.
Forrester's zero trust framework gives a clear overview of the seven pillars that provide a comprehensive zero trust strategy: data, people, workloads, devices, networks, automation and orchestration, and visibility and analytics.
There are actually tools available for organizations, one example being Forrester's Zero Trust Model Assessment Tool, which are designed to help identify gaps in an organization's adoption of zero trust.
Once the primary focus point has been identified in step 2, businesses can source the correct security controls in order to move on to the next stage in the zero trust process.
Organizations must have an ongoing understanding of their own maturity across the zero trust pillars, so that they can continue to identify which of them need more focus and take incremental steps to improve that maturity.
News URL
http://feedproxy.google.com/~r/HelpNetSecurity/~3/WtrXMcjcZSI/