Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Zero Trust Overview and Playbook Introduction

You're reading from  Zero Trust Overview and Playbook Introduction

Product type Book
Published in Oct 2023
Publisher Packt
ISBN-13 9781800568662
Pages 240 pages
Edition 1st Edition
Languages
Authors (2):
Mark Simos Mark Simos
Profile icon Mark Simos
Nikhil Kumar Nikhil Kumar
Profile icon Nikhil Kumar
View More author details

Table of Contents (13) Chapters

Preface 1. Chapter 1: Zero Trust – This Is the Way 2. Chapter 2: Reading the Zero Trust Playbook Series 3. Chapter 3: Zero Trust Is Security for Today’s World 4. Chapter 4: Standard Zero Trust Capabilities 5. Chapter 5: Artificial Intelligence (AI) and Zero Trust 6. Chapter 6: How to Scope, Size, and Start Zero Trust 7. Chapter 7: What Zero Trust Success Looks Like 8. Chapter 8: Adoption with the Three-Pillar Model 9. Chapter 9: The Zero Trust Six-Stage Plan 10. Chapter 10: Zero Trust Playbook Roles 11. Index 12. Other Books You May Enjoy

How to Scope, Size, and Start Zero Trust

The journey of a thousand miles begins with a single step.

Lao Tzu

Now that we understand Zero Trust and its role in managing Artificial Intelligence (AI) security risks, let’s address the top questions about planning and getting started with a Zero Trust transformation.

This chapter covers the following topics:

  • Agile security – think big, start small, move fast – Zero Trust enables agile security that overcomes perfection myths to enable continuous improvement and prioritization.
  • Scoping, sizing, and starting Zero Trust – common questions on how to plan a Zero Trust transformation and tailor playbooks to your organization.
  • Key terminology changes and clarification – addresses key wording changes in Zero Trust as well as common points of confusion with terminology that is used differently by different teams in an organization.

Let’s start by...

Agile security – think big, start small, move fast

Security must be agile!

As we discussed in Chapter 3, Zero Trust Is Security for Today’s World, security must continuously adapt to ongoing changes in business conditions, technology platforms, and attackers who are creative, intelligent, and motivated to learn and adapt.

Staying adaptive to these changes requires an agile approach to security that assumes failure (assumes compromise) and focuses on incremental progress rather than deferred perfection.

What is agile security?

Agile security is simply acknowledging that the real world is messy and unpredictable, and adapting to that.

Zero Trust enables an agile approach to security. Zero Trust enables security to be agile and keep up with continuously changing requirements (business requirements, technology platforms, security threats, and more).

While this is simple, it isn’t easy to adopt this way of thinking if you have been used to classic...

Scoping, sizing, and starting Zero Trust

There is only one way to eat an elephant: a bite at a time.

Desmond Tutu

You can start Zero Trust in many different ways. In fact, many organizations have already started on parts of Zero Trust without realizing it or without calling it Zero Trust. This could include ensuring the integration of security risk into business risk management, adopting modern security operations practices, updating access control and other security approaches for the cloud, and more.

A Zero Trust transformation involves changes across many teams and connecting teams together to work as a team of teams. This is a large scope of changes for an organization to understand, plan, and execute. This naturally leads to questions on how best to scope, size, and start the Zero Trust journey.

The top questions that often arise are the following:

  • Will Zero Trust work in my organization? How will it apply to our size, industry, culture, and processes...

Key terminology changes and clarification

One of the side effects of connecting business, technology, and security teams together is terminology confusion. As these teams start working more closely together, they often face points of confusion around language, terminology, and its meaning.

Some terminology and concepts are new to teams that haven’t worked together before, some of the same (or similar) terminology has different meanings to different teams, some terminology is new to everyone, and some common terminology is just outdated and misleading.

The most common points of confusion typically center around the use of the words assets (and related words), operations (and related words), and the network (or the enterprise).

Newer terminology – technical estate

The series uses “technical estate” or “technology estate” to refer to all technology used by an organization to get work done, including all data and all IT, Operational...

Summary

In this chapter, we answered some common questions around scoping, sizing, and starting Zero Trust, which helped us think about structuring the approach to meet the unique needs of an organization. We saw how these playbooks are compatible with any size organization and any style, from well-established organizations to digital-native organizations.

Next up, in Chapter 7, What Zero Trust Success Looks Like, we will take a look at common causes of technology project failures and how to avoid them on this Zero Trust journey.

lock icon The rest of the chapter is locked
You have been reading a chapter from
Zero Trust Overview and Playbook Introduction
Published in: Oct 2023 Publisher: Packt ISBN-13: 9781800568662
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}