Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Zero Trust Overview and Playbook Introduction

You're reading from  Zero Trust Overview and Playbook Introduction

Product type Book
Published in Oct 2023
Publisher Packt
ISBN-13 9781800568662
Pages 240 pages
Edition 1st Edition
Languages
Authors (2):
Mark Simos Mark Simos
Profile icon Mark Simos
Nikhil Kumar Nikhil Kumar
Profile icon Nikhil Kumar
View More author details

Table of Contents (13) Chapters

Preface 1. Chapter 1: Zero Trust – This Is the Way 2. Chapter 2: Reading the Zero Trust Playbook Series 3. Chapter 3: Zero Trust Is Security for Today’s World 4. Chapter 4: Standard Zero Trust Capabilities 5. Chapter 5: Artificial Intelligence (AI) and Zero Trust 6. Chapter 6: How to Scope, Size, and Start Zero Trust 7. Chapter 7: What Zero Trust Success Looks Like 8. Chapter 8: Adoption with the Three-Pillar Model 9. Chapter 9: The Zero Trust Six-Stage Plan 10. Chapter 10: Zero Trust Playbook Roles 11. Index 12. Other Books You May Enjoy

What Zero Trust Success Looks Like

“Begin with the end in mind.”

Stephen Covey

Now that we understand why Zero Trust is so important and what it involves, let’s take a look at what success looks like for this (continuous) journey.

To be blunt, the world is littered with failed technology-related projects. You can confirm this with a quick internet search for “IT project failure rate” or ask any experienced colleague in your organization for a story about a failed technology project. Zero Trust is simply too important to get wrong. We can’t risk failing because of something we could have easily avoided.

This playbook series is designed to help you avoid failure in implementing Zero Trust by using proven models and applying best practices from real-world deployments of Zero Trust and other technology projects. This helps you avoid common causes of project failure, which are sometimes called antipatterns.

This chapter discusses...

Zero Trust success factors

Good judgment comes from experience, and experience comes from bad judgment.”

Fred Brooks

Let’s dive into how to avoid common pitfalls on the Zero Trust journey. These three success factors are based on direct Zero Trust experience and other large technology initiatives we have observed over the years. These three factors represent the hallmarks of successful initiatives and programs, factors that are typically weak or missing on failed projects.

These success factors are embedded into the fabric of the Zero Trust playbooks to make it easier for you to avoid common sources of friction and failure. We will directly or indirectly refer to many of these success factors and how they apply to business leaders, technical leaders, technical managers, architects, and technology practitioners.

The job is never done

It’s important to recognize that Zero Trust is a transformation to a dynamic state...

Factor one – clear strategy and plan

To ensure everyone is on the same page and moving in the same direction, it’s critical to have a clear strategy and plan to coordinate these efforts. This must be agile, must account for any unique aspects of your organization, and must be integrated into the organization’s operating model to sustain it and keep it on track.

Good news! You found this book series, which is designed to help you with building a clear strategy and plan!

This book series is structured into reference playbooks designed to guide each role on their part to play in Zero Trust. It includes the reference models, architectures, models, and strategies you need to pull this off. The playbooks include examples of how to integrate Zero Trust into different industries and organizational operating models and how to structure your Zero Trust operating model.

Tailoring the playbook to your organization and defining clear progress metrics will create clarity...

Factor two – security mindset and culture shifts

It’s critical to establish or reinforce key mindsets and cultural elements to shift security expectations and habits for stakeholders and roles across the organization. These go beyond the literal plan and create an invisible human fabric that helps everyone make similar decisions. This also helps people feel like they are on a common mission and work better together as they figure out this new world.

You can make partial progress on Zero Trust without the organization completely adopting these mindsets, but you will face greater organizational friction each step of the way. The effort will be slower, costlier, and less effective.

This section defines patterns of repeatable behaviors that lead to Zero Trust success and security agility. These patterns help guide organizations through cultural change and adapting to a Zero Trust culture by driving the right mindsets and cultural elements. Each of the following patterns...

Factor three – human empathy

I cannot solve problems that I don’t see or understand.

The third critical success factor that enables digital, cloud, and Zero Trust transformations to go smoothly is the use of human empathy—focusing on the human experience of the transformation.

We can’t overstate the importance of the human side of this simultaneous transformation. Managing the human experience of change within ourselves and within our teams is a critically important success factor for the following reasons:

  • These transformations are made by people on your teams, and we all feel the impact of these transformations on our lives, jobs, careers, and more. Additionally, we are moving from static business processes (designed to be carried out by any qualified person in a role) to dynamic business processes where judgment calls and empathy are required to understand customers and their needs and ensure the organization is meeting them.
  • Change...

Summary

In this chapter, we examined three key success factors to help avoid common causes of failures—having a clear strategy, security mindsets and cultural shifts, and human empathy. These help you avoid common antipatterns (common mistakes) seen in Zero Trust and other technology initiatives. Each playbook includes specific antipatterns to avoid—for business leaders, technical leaders, architects, and technical managers, and for IT and security practitioners.

Next up, in Chapter 8, Adoption with the Three-Pillar Model, we will describe how the three-pillar model helps you meet these success factors.

lock icon The rest of the chapter is locked
You have been reading a chapter from
Zero Trust Overview and Playbook Introduction
Published in: Oct 2023 Publisher: Packt ISBN-13: 9781800568662
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}