{"id":343,"date":"2021-02-25T23:01:00","date_gmt":"2021-02-25T23:01:00","guid":{"rendered":"https:\/\/www.cycognito.com\/blog\/?p=343"},"modified":"2024-01-06T23:03:03","modified_gmt":"2024-01-06T23:03:03","slug":"get-started-on-zero-trust","status":"publish","type":"post","link":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/","title":{"rendered":"Get Started on Zero Trust"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">A practical, 5-step approach based on advice from the experts<\/h5>\n\n\n\n<p>Digital transformation, adoption of cloud, the disappearing perimeter, and in 2020 the sudden everyone-work-remote push of COVID-19 has super charged the urgency and adoption of a Zero Trust approach to security. A simple Google search brings up volumes of news about ransomware getting through the perimeter to take over organizations in attacks that take advantage of corporate exposure to the internet through vulnerable and unpatched network equipment and servers, misconfigured workloads, remote access servers with open RDP access, and more.<\/p>\n\n\n\n<p>Now is the perfect time to kick off a Zero Trust initiative if you haven\u2019t already. Zero Trust has implications for almost every element of your IT infrastructure. It can feel like you are boiling the ocean.<\/p>\n\n\n\n<p>But where do you start?<\/p>\n\n\n\n<p>If you examine the&nbsp;<a href=\"https:\/\/www.forrester.com\/report\/Five+Steps+To+A+Zero+Trust+Network\/-\/E-RES120510\">Forrester<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-207\/final\">NIST playbooks<\/a>&nbsp;for achieving a Zero Trust architecture you will discover a practical blueprint for implementing your initiatives. We took inspiration from their advice to create the 5-step process outlined below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 1: Baseline<\/h2>\n\n\n\n<p>The experts agree that the first thing you need to do is discover and inventory all your assets.<\/p>\n\n\n\n<p>This extensive asset inventory must include known owned assets as well as difficult-to-discover unknown \u201cshadow IT\u201d assets and third-party-owned assets that connect into your enterprise. Both Forrester and NIST emphasize the requirement to have this asset inventory baseline and both warn that a Zero Trust initiative can fail if you don\u2019t do this. This is basic infrastructure and security hygiene but most organizations do not have a reliable asset inventory, so this is where your Zero Trust journey begins.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 2: Test &amp; Secure<\/h2>\n\n\n\n<p>Perform a risk assessment on your assets and business processes. Involve the owners of those assets and processes. This also includes third-party owners. Take steps to secure these assets. NIST specifies security posture, configuration management and monitoring here.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 3: Establish Microperimeters &amp; Policies<\/h2>\n\n\n\n<p>This is where you build policies and deploy new technologies to move your organization to a Zero Trust default model. Make sure your microperimeters are tightly controlled because, as your digital transformation progresses, you will have more assets outside your traditional perimeter. A network-centric project might lean in on microsegmentation here. An identity and access project would lean in on user-centric access policies. A cloud project might focus on security configurations. Most organizations start with a reporting-only or a test deployment mode to ensure new policies are workable before moving to fully deployed enforcement.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 4: Continuously Monitor<\/h2>\n\n\n\n<p>Continuously monitor your environment and log traffic. Be prepared to respond to issues and modify policies based on real world operations. Watch for emerging exploits, vulnerabilities, and exposures. The Forrester model emphasizes visibility and analytics to help your SOC respond better and faster to security issues. NIST recommends establishing a baseline of activity patterns after initial deployment so that later anomalous behavior can be more easily identified.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Step 5: Automate, Orchestrate, &amp; Report<\/h2>\n\n\n\n<p>Forrester recommends organizations deploy orchestration and automate responses to security incidents and changes in the enterprise environment. You\u2019ll thank yourself if you can find ways to do this. This is often easier said than done but every little bit helps. Track your progress and report your success back to leadership. It is easier to get budget and resources if you can show steady progress.<\/p>\n\n\n\n<p>A typical enterprise will operate with a hybrid of Zero Trust and traditional perimeter architectures. Most Zero Trust strategies are chunked into Zero Trust projects anchored in specific network, cloud, application, or access initiatives. You will continually revisit this process as you identify new initiatives, assets, and workflows for your organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero Trust has implications for every element of your IT infrastructure. See how attack surface management fits into a Zero Trust approach to security.<\/p>\n","protected":false},"author":22,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[6,9,49,108],"class_list":["post-343","post","type-post","status-publish","format-standard","hentry","category-perspectives","tag-attack-surface-management","tag-cybersecurity","tag-vulnerability-management","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Get Started on Zero Trust | CyCognito Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Get Started on Zero Trust | CyCognito Blog\" \/>\n<meta property=\"og:description\" content=\"Zero Trust has implications for every element of your IT infrastructure. See how attack surface management fits into a Zero Trust approach to security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"CyCognito Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-25T23:01:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-06T23:03:03+00:00\" \/>\n<meta name=\"author\" content=\"Raphael Reich\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Raphael Reich\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/\"},\"author\":{\"name\":\"Raphael Reich\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7\"},\"headline\":\"Get Started on Zero Trust\",\"datePublished\":\"2021-02-25T23:01:00+00:00\",\"dateModified\":\"2024-01-06T23:03:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/\"},\"wordCount\":610,\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"keywords\":[\"Attack Surface Management\",\"Cybersecurity\",\"Vulnerability Management\",\"Zero Trust\"],\"articleSection\":[\"Perspectives\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/\",\"name\":\"Get Started on Zero Trust | CyCognito Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\"},\"datePublished\":\"2021-02-25T23:01:00+00:00\",\"dateModified\":\"2024-01-06T23:03:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cycognito.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Get Started on Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#website\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"name\":\"Cycognito Blog\",\"description\":\"Research, Product News and Latest Updates\",\"publisher\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#organization\",\"name\":\"Cycognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"contentUrl\":\"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png\",\"width\":1720,\"height\":550,\"caption\":\"Cycognito\"},\"image\":{\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7\",\"name\":\"Raphael Reich\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g\",\"caption\":\"Raphael Reich\"},\"description\":\"Was Vice President of Marketing at CyCognito\",\"url\":\"https:\/\/www.cycognito.com\/blog\/author\/raphael-reich\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Get Started on Zero Trust | CyCognito Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/","og_locale":"en_US","og_type":"article","og_title":"Get Started on Zero Trust | CyCognito Blog","og_description":"Zero Trust has implications for every element of your IT infrastructure. See how attack surface management fits into a Zero Trust approach to security.","og_url":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/","og_site_name":"CyCognito Blog","article_published_time":"2021-02-25T23:01:00+00:00","article_modified_time":"2024-01-06T23:03:03+00:00","author":"Raphael Reich","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Raphael Reich","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/#article","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/"},"author":{"name":"Raphael Reich","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7"},"headline":"Get Started on Zero Trust","datePublished":"2021-02-25T23:01:00+00:00","dateModified":"2024-01-06T23:03:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/"},"wordCount":610,"publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"keywords":["Attack Surface Management","Cybersecurity","Vulnerability Management","Zero Trust"],"articleSection":["Perspectives"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/","url":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/","name":"Get Started on Zero Trust | CyCognito Blog","isPartOf":{"@id":"https:\/\/www.cycognito.com\/blog\/#website"},"datePublished":"2021-02-25T23:01:00+00:00","dateModified":"2024-01-06T23:03:03+00:00","breadcrumb":{"@id":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cycognito.com\/blog\/get-started-on-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cycognito.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Get Started on Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.cycognito.com\/blog\/#website","url":"https:\/\/www.cycognito.com\/blog\/","name":"Cycognito Blog","description":"Research, Product News and Latest Updates","publisher":{"@id":"https:\/\/www.cycognito.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cycognito.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cycognito.com\/blog\/#organization","name":"Cycognito","url":"https:\/\/www.cycognito.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","contentUrl":"https:\/\/www.cycognito.com\/blog\/wp-content\/uploads\/logo-1720x550-1.png","width":1720,"height":550,"caption":"Cycognito"},"image":{"@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/5fc71e29aa32c6153db0b1cbcfd395a7","name":"Raphael Reich","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cycognito.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a187c2484d7ae7c4068cf1f26c507972?s=96&d=mm&r=g","caption":"Raphael Reich"},"description":"Was Vice President of Marketing at CyCognito","url":"https:\/\/www.cycognito.com\/blog\/author\/raphael-reich\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/users\/22"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/comments?post=343"}],"version-history":[{"count":1,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/343\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/posts\/343\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/media?parent=343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/categories?post=343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cycognito.com\/blog\/wp-json\/wp\/v2\/tags?post=343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}