Study Guide - Zero-Trust-Strategy
Study Guide - Zero-Trust-Strategy
https://cloudsecurityalliance.org/research/working-groups/zero-trust/
Disclaimer
Cloud Security Alliance designed and created this Zero Trust Training course study guide (the “Work”)
primarily as an educational resource for security and governance professionals. Cloud Security
Alliance makes no claim that use of any of the Work will assure a successful outcome. The Work
should not be considered inclusive of all proper information, procedures and tests or exclusive of
other information, procedures and tests that are reasonably directed to obtaining the same results.
In determining the propriety of any specific information, procedure or test, professionals should
apply their own professional judgment to the specific circumstances presented by the particular
systems or information technology environment.
© 2024 Cloud Security Alliance – All Rights Reserved. You may download, store, display on your
computer, view, print, and link to the Cloud Security Alliance at https://cloudsecurityalliance.org
subject to the following: (a) the draft may be used solely for your personal, informational,
noncommercial use; (b) the draft may not be modified or altered in any way; (c) the draft may not be
redistributed; and (d) the trademark, copyright or other notices may not be removed. You may quote
portions of the draft as permitted by the Fair Use provisions of the United States Copyright Act,
provided that you attribute the portions to the Cloud Security Alliance.
CSA Address
The Zero Trust Training was developed with the support of the Cloud Security Alliance Zero Trust
Training (ZTT) Expert Group, whose members include volunteers from a wide variety of industries
across the globe. Made up of subject matter experts with hands-on experience planning and
implementing ZTT, both as cloud service consumers and providers, the ZTT Expert Group includes
board members, the technical C-suite, as well as privacy, legal, internal audit, procurement, IT,
security and development teams. From cumulative stakeholder input, the ZTT Expert Group
established the value proposition, scope, learning objectives, and curriculum of the Zero Trust
Training.
To learn more about the Zero Trust Training and ways to get involved please visit: https://
cloudsecurityalliance.org/zt/
We would also like to thank our beta testers, who provided valuable feedback on the Zero Trust
Training.
Contributing Editors:
Jason Garbis, Founder and Principal, Numberline Security
Mark Schlicting, Information Security Architect, BPM
Richard Lee, Consultant/Principal, MITRE
Roland Kissoon, Senior Specialist - Cyber Security, Microsoft
Expert Reviewer:
Chase Cunningham, Speaker, Podcaster, Author, Dr. Zero Trust
Hannah Day, Principal Cloud Security Architect, Mayo Clinic
Jaye Tilson, Director of Strategy, Axis Security
Jonathan Flack, Principal Architect, Cloud & Security Architecture, Under contract to the Department
of the Air Force
Matt Lee, Senior Director of Security and Compliance Pax8
Dr. Matt Meersman, Principal CyberSecurity Engineer & PhD Student, MITRE
Dr. Ron Martin, Professor, Capitol Technology University
CSA Staff:
Adriano Sverko, Technical Writer, Cloud Security Alliance
Andy Ruth, Content Developer, Cloud Security Alliance
Anna Campbell Schorr, Training Program Manager, Cloud Security Alliance
Chandler Curran, Training Project Manager, Cloud Security Alliance
Daniele Catteddu, Chief Technology Officer, Cloud Security Alliance
Erik Johnson, Senior Research Analyst, Cloud Security Alliance
Hannah Rock, Content Development Manager, Cloud Security Alliance
Judy Bagwell, Training Project Manager, Cloud Security Alliance
Stephen Smith, Senior Graphic Designer, Cloud Security Alliance
This course presents an in-depth exploration of Zero Trust (ZT) from an organizational strategic
perspective; and it also delves into the foundational principles of ZT, its benefits, and the critical
factors driving organizational buy-in and strategic alignment.
This course comprises several units, each addressing a distinct, strategic ZT aspect:
Course Structure
• Unit 1: Levels of Strategy
• Unit 2: Zero Trust Drivers & Buy-In
• Unit 3: Tactics for Zero Trust
• Unit 4: Zero Trust & Operations
And that’s not all. A ZT strategy impacts how product teams develop, deliver and utilize IT products
in their line of business (LOB). Collaboration with LOBs is important: If you can foster clarity where
there is confusion, especially in the early planning phases, you can effectively convert concepts to
intent, and intent to action and results.
Configuration state is important for site reliability, and monitoring for breaches or attacks. Though
LOBs must focus on their own strategies and approaches to adding value, their cyber activity must
be operated and monitored. In the event of breach, tools and business data must be returned to a
known state, and preferably to the expected known state.
One of the main goals in discussing strategic terms is to assist you in thinking and communicating
clearly and with authority. Clear, concise communication may drive projects to their milestones and
ultimate completion. The table below defines organizing engagement levels used in this course
(depending on your organization, actual levels may vary), as follows:
1
Note: This is not an exhaustive list of ZT considerations, instead it is meant to serve as an example
to get students to begin thinking about the different strategic levels and how they relate to ZT.
Tactics The things you Put ZT frameworks • Simplify user access and
use. These are into action: ZT Design assign clear management
the specific tools, principles, five steps for ZT responsibilities.
methods or implementation, Zero Trust • Deploy a micro-
actions employed Maturity Model (ZTMM). segmentation solution to
to execute isolate applications and data
strategy. Integrate with standard from each other.
business practices: Lean
manufacturing practices,
JIT inventory management,
continuous improvement
initiatives.
Operations The way you use Integrate user experience • Monitor the organization’s
them. Details of (UX) and site reliability network and systems for
how these tools engineering (SRE) in ZT suspicious activity.
and actions are adoption, focusing on • Respond to ZT security
successfully code-driven automation incidents in a timely and
employed in for enhanced operational effective manner.
practice to efficacy. • Provide ZT security
work towards awareness training to
the strategic employees.
objectives.
ZT can impact every person and process inside an organization, as well as the entire technology
stack. It should be treated as a holistic cybersecurity strategy that covers all enterprise technology
domains. This includes cloud and multi-cloud environments, internal and external endpoints. The
strategy also includes organizational and bring your own device (BYOD) scenarios, on-premises and
hybrid systems, as well as operational technology (OT) and internet of things (IoT).4
ZT is a set of principles and practices designed to reduce cyber risk in today’s dynamic IT
environments. As a cybersecurity strategy, ZT requires strict authentication and verification for
all entities (e.g., each person, device or service) trying to access an IT resource. It doesn’t matter
whether the access is inside or outside the physical network perimeter. ZT emphasizes the
protection of individual assets (systems and data) rather than network segments.
Guiding ZT principles, significance and value vary for each organization, depending on factors such
as location, industry and individual traits. The following is a list of some of the tenets that have been
discussed5:
2
As many organizations familiarize themselves with Zero Trust, they frequently discover a large
amount of misinformation that makes navigating difficult. Cloud Security Alliance’s Zero Trust
Advancement Center (ZTAC) cuts through the noise, focusing on solutions, not vendors, and
delivering trusted guidance that helps raise ZT strategy to the next level.
3
NSTAC. (2022). Report to the President on Zero Trust and Trusted Identity Management. Pg.1
4
Cloud Security Alliance (N.A) Zero Trust Implementation Primer - The Five Step Process (Draft). Pg. 6.
5
See Cloud Security Alliance course Introduction to Zero Trust Architecture for an in-depth review of
ZT tenets.
ZT is a holistic endeavor and not just a tactical change. As such, it represents a strategic realignment
of the entire security posture. This realignment starts at the highest engagement with the
organizational strategic objective6. For some organizations, this may be synonymous with preventing
any breach. For others, it may not be a breach that is most important, but the resiliency in place to
limit the impact of it.
Furthermore, as the table that defines the different types of organizing levels mentioned (Table 1:
Engagement Levels with Examples and ZT Considerations), Zero Trust Architecture (ZTA) is not just
a technical recommendation, but also a cultural shift. The shift demands that security aligns closely
with business functions, acknowledging that different departments may have varied security needs.
There may be other organizational objectives. Regardless of the specific organizational strategic
objective, ZT should be seen as the guiding principle or the big idea at the strategy level. ZT should
be seen as directly contributing to the organizational strategy.
At the tactical level, implementing ZT involves specific actions. For example, strict access control on
a need-to-know basis and secure access to resources regardless of their location. These topics are
discussed in more detail in the tactics and operations sections. Such alignment ensures that security
enables business operations, rather than hindering them. It requires an architecture that allows
for flexibility, catering to different service level agreements (SLAs), administrative controls, audit
requirements, regulations and certifications.
IT strategy also encompasses user and entity behavior analytics (UEBA). Additionally, technology
strategy must integrate closely with governance, while rigorously controlling and monitoring access
to reduce risk. Cybersecurity goals, including ZT, should align with the organization’s overall strategy
and board-level roadmap, guiding various projects and technology strategies for the upcoming years.
6
In some organizations, this is also referred to as the “grand strategic objective.”
ZT and technology strategies are closely connected to governance, risk management, and
every aspect of security, but it is important to clarify the role of each framework. Governance,
focusing on establishing and maintaining policies, standards and guidelines, plays a crucial role
in ZT implementations. The governance ensures that ZT practices not only adhere to regulatory
requirements but also align with the organization’s overall objectives. This relationship positions ZT
as a strategic element within the governance landscape. This lesson does not cover risk management
or compliance strategies because they are covered in other lessons.
1.4 Tactics
Tactics, within the context of a ZT strategy, are crucial for effectively addressing specific risks
and aligning security measures with organizational objectives. These tactics involve prioritizing
business goals, adopting an “inside out” security approach, and implementing the principle of least
privilege to control resource access. Metrics and reporting improvements are vital for assessing
ZT effectiveness. Monitoring and logging network traffic and identifying and protecting critical
data, applications, assets and services (DAAS) also plays a pivotal role in these tactics. Additionally,
transitioning to ZT requires a phased, risk-based approach that impacts tactics, such as precise policy
creation, prioritization, and iterative implementation.
Tactics are fundamental in ensuring a smooth transition to a ZTA and are focused on protecting
assets and resources efficiently. ZT policies, detailed access controls, monitoring network traffic, and
setting progress metrics contribute to the successful implementation of ZT principles. Organizations
can bolster their cybersecurity posture by adopting these tactics and gradually progress along a Zero
Trust Maturity Model (ZTMM)7, ultimately achieving improved security outcomes. Tactics and the
maturity model are covered in the tactics units.
NIST Zero Trust Architecture (SP 800-207)8 defines the tenets that are fundamental to a ZT
environment. As such, the tenets need to be considered before deploying policy enforcement points
(PEPs) and policy decision points (PDPs). To meet these foundational tenets, a dynamic policy must
drive the shift away from network access. The policies must motivate organizations to implement
measures that reduce the attack surface prone to lateral attacks, such as macro and micro-
segmentation.
7
CISA. (2023). Zero Trust Maturity Model (Version 2.0).
8
NIST. (2020). Zero Trust Architecture (SP 800-207).
1.5 Operations
Operations refers to the activities, processes and procedures involved in managing and maintaining
organizational infrastructure and IT infrastructure. This includes a range of tasks, aimed at ensuring
the effective and efficient functioning of all IT resources, such as hardware, software, networks and
data storage systems.
Achieving ZT success involves several important considerations in managing and executing day-to-
day operations. When a ZT strategy is implemented, the identity management process should be
automated, as should monitoring and detection. Day-to-day tasks people in the roles listed above
perform include:
• Organizing log data so that input logs from different sources can be looked at and analyzed
using the same tools and interfaces.
• Adjusting controls and fine tuning the automation regularly to make sure it checks the right
parameters according to policy rules.
• Monitoring to ensure that the automatic checks of logs catch any activities that don’t follow
the policy rule.
Ensuring cybersecurity solutions enhance rather than add friction to a user’s productivity and
overall experience is an important organizational goal that operational leaders must focus on and
defend. Operational processes, such as site reliability engineering (SRE), and a focus on automation
and scalable systems, can improve operational efficiency and promote a positive user experience.
Furthermore, operational procedures may need updates to align them with a new ZT framework,
ensuring that response strategies and daily activities align with ZT principles.
Challenges include integrating ZT with legacy systems, where a tailored approach is necessary.
Maintaining vigilance in monitoring the evolving threat landscape ensures ZT remains agile and
responsive. These concepts are expanded upon in a unit dedicated to ZT operations.
To get started in defining the desired state, you may wish to ask the following questions:
ZT principles make it easier for IT teams and network infrastructure teams to enforce policies
consistently and accurately, enabling a more friction-free work environment. This is because
implementation of a Zero Trust Architecture (ZTA) requires moving the access enforcement points
closer to the protected asset.
In the realm of ZT, the foundational principle is never trust, always verify. An organization shifts its
capabilities, such that it can continually assess and contextualize the risk or risks involved in granting
an entity access to an asset.
Remember, this assessment that leads to a decision is not just about having a static defense
mechanism in place. It is about creating a proactive, dynamic control plane that evolves with the
changing risk landscape. In a ZT environment, access is not only based on contextual factors, it is
also temporal. The access needs to adapt to new emerging threats, requiring a continuous review
of existing controls and emerging threats. The continuous review must ensure the organization can
function without friction from security controls while retaining sufficient protection. The emphasis
here is on maintaining consistent, measurable effectiveness.
Aligning a ZTA with an organization’s risk appetite is a strategic process, aiming to deliver security
solutions that support the board’s strategic vision.
The board plays a crucial role in organizational alignment, as they are responsible for setting and
defining the risk appetite, setting budgets and determining the appropriate risk oversight structure.
Strategic alignment and budget influences technology and control selection, resource allocation, and
policy-making, ensuring a viable cybersecurity strategy.
Monitoring the evolving threat and risk landscape is part of risk management. Cyber threats evolve
continuously, and implementing continuous monitoring involves regularly assessing and updating
an organization’s understanding of potential threats and vulnerabilities. This process includes
analyzing cyberattack trends, identifying new methods employed by attackers, and understanding
the implications of technological advancements on security. Organizations need to address these
challenges to secure their systems. ZT offers a framework that facilitates a shift in mindset that
promotes securing and protecting what is important for the organization.
The primary goal of the business case, which is defined further during Cloud Security Alliance’s
Zero Trust Planning training, illustrates how an initiative delivers organizational value and return on
investment (ROI). The business case also requires alignment with organizational strategy.
Consider these organizational elements during the buy-in phase to lay a solid foundation for a
successful and strategic implementation of ZT:
• Alignment with, and assistance in, delivering key business goals and objectives.
• The value to the business in implementing a ZTA, both tangible and intangible.
• Key stakeholder buy-in: ZT is everyone’s responsibility, not just the purview of IT or the
Chief Information Security Officer (CISO). Gaining support from the key stakeholders across
departments is essential.
• Assets inventory, classification, and categorization of business critical assets or asset
classes. These must also be defined in terms of risk to the business.
• Compliance and governance: Confirm that any changes made by implementing ZT align with
existing compliance requirements. This ensures regulatory adherence and strengthens the
organization’s security posture.
• Strengths, weaknesses, opportunities, and threats (SWOT) analysis or cost/benefit
analysis (CBA): Perform a SWOT analysis to help identify internal strengths, weaknesses,
opportunities and threats. CBAs are also helpful. These help guide IT professionals in the
initial stages of a ZT implementation.
Privacy
• Data Minimization and Access Control: By adhering to the principle of “never trust, always
verify,” ZT ensures that access to sensitive data is tightly controlled and monitored, reducing
the risk of unauthorized data exposure.
• Enhanced User Privacy: ZTAs can protect user privacy by limiting access to personal data
and ensuring that only necessary data is processed and stored.
Security
• Reduced Attack Surface: ZT requires strict access controls without implicit trust and micro-
segmentation. The two limit the pathways an attacker can use to move laterally across a
network.
• Real-time Monitoring and Response: Continuous monitoring is a key tenet of ZT, allowing for
real-time detection and response to threats, thereby enhancing security postures.
Compliance
• Regulatory Alignment: Many regulatory frameworks require strict access controls and data
protection measures, which are core components of a ZT model.
• Audit and Reporting: ZT architectures make it easier to log access and changes, thus
supporting compliance reporting and auditing requirements.
• Often the implementation of ZT-based access simplifies the traditional access mechanism
for the user, enhancing productivity. ZTA helps with quick and seamless access to the assets
irrespective of location and network boundaries.
• It is essential to designate a person or a limited number of people with the accountability
and authority to manage a particular area. A clear owner ensures issues are identified and
highlighted at the appropriate level.
10
Cloud Security Alliance. (2023). Zero Trust Guiding Principles.
• ZT Design Principles
• Focus on Business Outcomes: Understanding how ZT aligns with and supports the
organization’s primary business goals.
• Design from the Inside Out: Developing a security strategy that starts within the
organization before extending outwards.
• Determine Who/What Needs Access: Identifying which users and devices require
access to specific resources.
• Inspect and Log Key Traffic: Aim to monitor and record critical activity for potential
threats as a targeted approach.
• Foundational Principles of ZT Design
• Step 1: Define Your Protect Surface(s): Identify and secure critical data and resources
within the network (environment).
• Step 2: Map the Transaction Flows: Understand the movement of data within and
outside the organization and the potential classification of each transaction type.
• Step 3: Build a Zero Trust Architecture (ZTA): Develop the infrastructure and capabilities
necessary for ZT.
• Step 4: Create ZT Policy: Establishing guidelines and rules for network, system and
data access and security.
• Step 5: Monitor and Maintain the Network (Environment): Continuously oversee the ZT
environment to ensure ongoing security and adapt to new threats.
These elements are vital in shaping and executing an effective security approach aligning with an
organization’s objectives.
11
(2023) Zero Trust Explained by John Kindervag
If ZT is the chosen strategy, it’s crucial to prioritize business objectives tailored to your organization’s
specific goals and requirements. From the outset, ZT demands a clear vision, whether it’s to manage
risks within acceptable limits, reduce compliance costs, or minimize the impact of security incidents.
An effective ZT strategy balances security with the cost and value of security and available-
resource use to deliver on security initiatives versus other business initiatives like product or feature
development, while avoiding excessive measures that could hinder competitiveness.
ZT marks a shift from traditional perimeter-centric security models, which operate on the obsolete
premise that everything inside a network is safe, while external entities pose threats. ZT flips this
notion, recognizing that threats can originate from anywhere—both inside and outside the network.
This paradigm shift dictates a security architecture designed from the inside out. The design begins
with the organization’s most critical assets and data at its core and securing access from inside the
network, and then extending protection outward. This strategy reorients IT policies to move from a
stance of broad threat defense to a focused asset protection approach. The reorientation ensures
that the most vital resources are safeguarded at their heart to mitigate the risk of unauthorized
access and data breaches.
To connect the design shift to operational strategy, it’s important to consider the constraints of
limited resources, which all organizations face. This constraint necessitates effective prioritization
based on asset value. Conducting a business impact assessment (BIA) or an asset inventory
categorized by value helps in identifying critical resources. By ranking assets according to their
criticality or value, organizations can efficiently allocate their resources, aligning their security efforts
with ZT principles and securing both protect and attack surfaces more effectively.
12
Figure adapted from: (2023) Zero Trust Explained by John Kindervag.
Today, organizations operate on a global scale, leveraging remote work, joint ventures, outsourced
services, and cloud technology. In a ZT security approach, the principle of least privilege (attribute
of never trust, always verify) necessitates a precise determination of who or what needs access to
certain resources, along with the duration and associated risks of such access. This principle ensures
that each entity – be it a user or a system – has access strictly as per their need, thus narrowing the
attack surface and enhancing security. An asset’s visibility should strictly conform to the need-to-
know basis, remaining invisible to those without a legitimate requirement for access.
The concept derived from the Identity Security Alliance, as depicted in Figure 4 Zero Trust From
a People Perspective, encompasses seven elements: users, applications, infrastructure, identity,
device/workload, access, and transaction. Training individuals outside of security roles, like network
teams and developers, to identify and manage trust relationships across these elements is a key
challenge. Critical tasks include mapping out where trust is established. Examples include between
users and identities or infrastructure and identities, and adopting secure practices like proper firewall
configurations and secure coding. A thorough understanding of these trust points allows for the
effective identification and mitigation of vulnerabilities that cybercriminals target. Benefit is derived
from the insights gained through extensive penetration testing experience.
13
Cloud Secuirty Alliance. (2023) The Most Important Part of Zero Trust: People by George Finney
In the journey towards ZT adoption, organizations require some sort of logging and monitoring
capabilities. The level of sophistication will vary greatly, depending on the level of organizational
maturity, and the resources available.
This process typically begins with the establishment of foundational log management practices.
This means starting with the basic yet important step of implementing systems to gather user and
entity activity logs, particularly focusing on privileged credentials, coupled with routine manual
analysis. This initial phase should cover all essential ZT pillars, laying the groundwork for more
advanced security measures.
In scenarios where the organization has control over network-level infrastructure or can log traffic at
the access gateway, it’s strategically important to incorporate relevant and contextual ZT logs into a
SIEM system or log management tool. This integration not only enhances the organization’s security
posture but also aligns with the fundamental principles of ZT. The integration ensures continuous
monitoring and adaptation to the ever-evolving security landscape. The ability to assess and log
relevant and contextual traffic from both internal and external sources can significantly enhance
operational intelligence.
Additionally, at high levels of maturity, the carefully selected log data from various layers or
applications can be unified into a common data structure. Data captured includes device, time,
user, and the resource or asset access (e.g., server, service, application, etc.) requested. By coupling
monitoring and logging, engineers can continuously improve security by rapidly countering any
suspicious activity. Continuously scrutinizing traffic patterns in such a manner is a powerful, strategic
asset.
Capturing data and monitoring it in real time requires the development of reactive controls, including
system and organization controls (SOC) assessments, analysis, response staff and automation
in the response pipeline. Logging is only any good if you do something with it, but for the many
organizations without a SOC in place, there is no reason for a major consolidated log database. It is
acceptable for the ZTA configuration to simply monitor and log:
14
NIST. (2020). Zero Trust Architecture (SP 800-207)
This section covers the CISA Zero Trust Maturity Model (ZTMM)16, which helps organizations enhance
their ZT strategies. The CISA ZTMM outlines maturity stages – Traditional, Initial, Advanced, Optimal
– across ZT pillars (Identity, Devices, Networks, Applications and Workloads, and Data) and capabil-
ities (visibility, automation, governance). These maturity stages help organizations assess, plan and
implement the necessary measures to progress toward a more secure ZTA. The CISA ZTMM journey,
depicted in the accompanying figure, represents a path towards achieving optimal ZT maturity. This
journey, a practical visual representation, shows how companies advance through ZT’s various matu-
rity levels.
15
Figure adapted from: CISA. (2023). Zero Trust Maturity Model (Version 2.0).
16
CISA. (2023). Zero Trust Maturity Model (Version 2.0).
To utilize the CISA ZTMM effectively, grasp the framework, refine your functions and assess your
current ZT maturity. Finally, plan steps for maturity advancement and align them with organizational
projects and priorities, using a prioritization model to guide you.
Tailoring the CISA ZTMM to fit your needs may seem overwhelming. It is not advisable to strive to
achieve optimal maturity across all pillars simultaneously. Nor is it advisable to focus on a single pillar
and expect to perfect it across the entire organization. Attempting to perfect one pillar (like identity)
across all systems before moving to the next is not only impractical but can lead to stagnation in
overall security posture improvement. It is important, instead, to evaluate each protect surface, using
worksheets such as the one illustrated below, which is based on the NSTAC report. Each worksheet
identifies the protect surface and critical data, assets, application, and services (DAAS) element
being evaluated, with 5 (optimized) representing the best possible score for each attribute. The total
perfect score on a worksheet would be 25. This is a rare occurrence. Such worksheets help teams
prioritize projects, based on safeguarding business-critical assets. This targeted approach allows for
a more accurate assessment of maturity gaps and enables the development of specific projects to
enhance the security and maturity of each protect surface. Furthermore, by evaluating each protect
surface individually, organizations can create a more nuanced and actionable cybersecurity roadmap.
Finally, all the protect surfaces can aggregate to define an overall score for the organization as well as
an average score per protect surface.
17
Figure adapted from: (2023) Zero Trust Explained by John Kindervag.
This methodology simplifies the complexity inherent in managing multiple and discrete identity
solutions across an organization. For example, if an organization focuses on improving the security
maturity of its directory services (as a protect surface), it can methodically elevate the maturity level
in this specific area, thereby making tangible progress and ensuring continuous improvement in cy-
bersecurity defense. Finally, it helps you monitor progress across various ZT projects to stay aligned
with your organization’s IT strategy and cybersecurity strategy.
You may also wish to explore this interactive CISA ZTMM Spreadsheet model19, a comprehensive
tool with status bars for monitoring progress. After a ZT assessment, approach the journey system-
atically, with the same considerations that we suggested if you choose to use the National Security
Telecommunications Advisory Committee (NSTAC) based assessment model:
You are encouraged to tailor the ZTMM approach to your organization’s needs. This pragmatic ap-
proach ensures that the journey towards a mature ZT environment is both achievable and manage-
18
Figure adapted from: NSTAC. (2022). NSTAC Report to the President on Zero Trust and Trusted
Identity Management. Pg. A-1
19
Jason Garbis and Numberline Security have created The Zero Trust Maturity Model Resource Center
and associated worksheets (GCP Sheets and Excel), aligned with the CISA ZTMM. Learn more about
these tools here.
• Beginning with the definition of protect surface(s) and a risk-based strategy in Step 1;
• Mapping transaction flows in Step 2;
• Building and implementing protect surface projects (tailoring the ZTA), that emphasize
flexibility and customization to work alongside existing network environments in Step 3;
• Focusing on creating precise ZT policies, addressing the who, what, where, when, why, how,
and for how long of access controls in Step 4; and
• Continuous monitoring and maintaining the network (environment) as it enters production
(fundamental to the sustained success of a ZTA) in Step 5.
These five steps collectively form the foundation for implementing a comprehensive ZT strategy.
As you embark on your ZT journey, shift your perspective to focus on what you’re protecting rather
than what you’re defending against. Visualize your end goal and prioritize safeguarding critical and
vulnerable components within your protect surface, known as DAAS. Organizations should prioritize
identifying protect surfaces, and then document attack surfaces to complement them, steering clear
of a traditional, attack-surface-centric approach. Examples include:
The fundamental objective of this step is to prove to your audience that you have an understanding
of how the whole cybersecurity system works. Mapping transaction flows for each protect surface
is critical for understanding how DAAS components interact (how the system works). The mapping
is also critical for determining the optimal placement of controls for data protection. These network
traffic patterns, specifically tailored to the protect surface data, are essential for shaping the overall
design.
Once the transaction flows have been mapped, the next task involves prioritizing, which may also
be shaped by the reality of the readily available resources. This process involves determining how
resources, such as personnel, time and budget, should be allocated to these prioritized flows to im-
plement the ZTA efficiently.
From a strategic viewpoint, defining protect surfaces and prioritizing transaction flows are neces-
sary inputs to request and allocate necessary resources (e.g., budget and personnel). For example,
20
Figure adapted from: (2023) Zero Trust Explained by John Kindervag.
Implementing a ZTA through protect surface projects is a journey that modifies the existing infra-
structure and processes rather than replaces what has already been implemented. Designing protect
surface projects involves mapping transaction flows, identifying controls and secondary protect
surfaces, and ultimately designing a system or solution. Even in a completely new environment,
transitioning to ZTA within a single technology refresh cycle is improbable. Adapting existing work-
flows to ZTA likely necessitates, at the very least, a partial overhaul. How an enterprise migrates to a
strategy depends on its current cybersecurity posture and operations. Migrating to ZTA requires an
organization to have detailed knowledge of its assets (physical and virtual), subjects (including user
privileges), and business processes.
Let us put these principles into plain and practical language. The protect surface with the most
sensitive assets is in most need of ZT. Temptation: address this surface first. However, the services,
assets or business data contained therein might need approvals from more than one department. As
we mentioned earlier, as a strategic thinker, you may benefit from delivering a faster or easier win. To
establish confidence and trust within the organization, you can opt to improve a protect surface that
needs less approvals and less time to complete – the low-hanging fruit.
Another strategy might be to look at protect surfaces where you can build some shared services, or
consolidate some technologies. Your benefit here is in showing value and then repeating what you
have done on other protect surfaces. With each consecutive instance producing better results in less
time. Something complex, such as centralization of Identity Providers (IdP centralization), may be
challenging in situations where you are implementing a centralized IdP in a large or complex organi-
zation, running legacy systems and diverse application environments. Visible benefits may include
simplified management, a better user experience or improved compliance with regulatory require-
ments22.
ZT frameworks are not tied to any specific technology, allowing organizations to fully customize their
security measures based on their unique protection needs. This flexibility allows for a security ap-
proach that is focused on critical protect surfaces within the organization. Dividing the network into
smaller, distinct segments to limit access and contain potential breaches, ensuring that even if one
segment is compromised, others remain secure heightens security and control over data flow within
the organization. Enterprises can adopt various approaches to implement ZTA, emphasizing differ-
ent components and policy rules. These approaches, namely governance-driven enhanced identity,
logical micro-segmentation, network-based segmentation, cloud usage and outsourcing, and even
removal of the corporate network altogether, all can adhere to ZT principles.
See NSTAC. (2022). NSTAC Report to the President on Zero Trust and Trusted Identity Management.
22
Depending on the enterprise, multiple ZTA deployment models may be employed within a particular
organization for various business processes.23
ZT policies form the cornerstone of a secure ZTA. While these policies are initially static, they should
be designed to evolve dynamically in tandem with the organization’s progression in implementing
and maturing its ZTA.
To effectively implement ZT, organizations should use the 5 W’s plus How for policy creation. This
method helps the effort focus on defining granular access controls and considerations for resource
access. It also helps you to write specific policy statements and procedures, tailored to the protect
surface access perspective. The list below outlines the key aspects that should be factored into any
risk evaluation when creating ZT policies:
• Who: Determine which entities (people, devices, organizations, code, agents, etc.) should
be allowed to access a particular resource.
• What: Understand the context in which the entity tries to access systems and/or data
• When: Define the time frames or conditions under which the entity may access the
resource.
• Where: Identify the location, network, or geo-fence that allows the entity access.
• Why: Establish why the entity (the “Who”) needs access to the resource, emphasizing the
justification.
• How: Define the technological controls necessary to deliver appropriate risk-based controls
to satisfy the 5 W’s.
In the CISA ZTMM, visibility and analytics provide the insights that improve ZT operations. Knowing
the current and dynamic state of each protect surface’s security posture within the network (environ-
ment) is critical to any potential response. This involves a focus on logging, monitoring and prompt
alerting. These components enable continuous improvement and an effective incident response
framework. Regular feedback loops, efficient incident detection, a robust response plan, and the
ongoing monitoring of activities are key to maintaining and updating policy rules.
It’s also important to regularly review and modify the protect surface and automated policies, which
can be achieved through quarterly reviews of ZT identity, devices, access, policies, and protect sur-
faces.
To learn more about model variations, review these Cloud Security Alliance courses: Introduction to
23
• System administration;
• Network management;
• Data management;
• Performance monitoring;
• Helpdesk and support; and
• DevOps and engineering (access workflow).
This section delves into the multifaceted approach necessary to effectively adopt and integrate ZTA.
It also emphasizes the need for a shift in corporate culture, tailored to each organization’s unique
business type and directorial objectives. Education initiatives are vital for both staff and senior man-
agement to understand and communicate the business value of ZT. This educational aspect is pivotal
for gaining board buy-in and aligning ZT with the organization’s strategic goals.
In response to the evolving cybersecurity regulatory landscape and the inadequacy of traditional
security models, ZT offers a proactive and comprehensive framework to protect sensitive data and
infrastructure. Organizations need to be aware of regulatory requirements in different regions and
adapt their ZT strategy accordingly, especially those with legacy systems. The organization may
need to adopt a vendor-based readymade solution to construct the automated workflow to integrate
multiple ZTA elements. More orchestration at each step, such as during access and monitoring, can
make the operation easier and more adoptable.
Finally, the integration of user experience (UX) and site reliability engineering (SRE) plays a critical
role in the successful adoption of ZT. By focusing on UX and automated, code-driven solutions,
organizations can foster greater team support, reduce human error, and ensure that security mea-
sures are both effective and user-friendly, ultimately enhancing their security posture and operational
efficiency.
• Cultivate a ZT culture:
• Emphasize people, processes and organizational aspects over technology acquisition.
• Implement continuous monitoring, logging and responsive actions.
• Change the tone from the top:
• Secure executive endorsement and support for ZT initiatives, ensuring leadership
commitment.
• Develop a communications plan for consistent stakeholder alignment and guidance on
the ZT journey.
• Instill a culture of continuous risk management:
• Continuously assess and measure risk to guide access decisions and align with risk
appetite.
Where applicable, the organization’s audit functions (both internal and external) need to participate in
the educational process. Auditors need to be informed about how ZT architecture enhances organi-
zational security and resilience.
Lastly, ZT training should be integrated into the existing training program for all staff. This integration
ensures that future updates, scheduling and necessary refreshes are consistently applied and not
overlooked by the organization’s training and education functions.
In this evolving scenario, specific regulations and compliance standards, such as General Data
Organizations must stay informed about the regulatory requirements in the countries and regions
where they store data and operate. The advent of new regulations often brings the need for specific
assessments or attestations, particularly during transitions to ZTAs.
In the United States, for instance, compliance with the Federal Information Security Management
Act (FISMA) becomes crucial for US federal government entities, and their suppliers and service
providers. This often necessitates optimization and automation of compliance tasks. The reasoning
behind this is linked to the requirements of FISMA, which mandates that agencies undergo a rigorous
cycle of assessment and reauthorization of systems, especially when making significant changes like
adopting ZT. The challenge lies in legacy environments, where agencies frequently find it difficult to
keep pace with these demanding tasks, resulting in potential delays or constraints in fully transition-
ing to a ZT framework.
Organizations with legacy systems and traditional trust models often encounter challenges in
adopting ZT, particularly due to limited network and asset visibility. As we have mentioned in other
sections, the transition to ZT varies with each organization’s unique attributes, including its maturity
level, mission and specific challenges. Not all legacy systems require immediate ZT upgrades, but
any updates should be strategically planned to address emerging threats and system modernization.
Legacy infrastructure influences the adoption of ZT models. For example, the Information Security
Continuous Monitoring (ISCM) model requires adaptable systems for its data movement workflows.
Legacy systems’ rigidity can hinder the implementation of such models. Additionally, an organiza-
tion’s experience with measurement programs affects its ability to adopt ZT, with more mature orga-
nizations adapting more easily than those with less developed measurement capabilities.
24
General Data Protection Regulation is designed to protect data and privacy of European Union
citizens.
25
Health Insurance Portability and Accountability Act is United States legislation designed to, in part,
protect a patient’s health information.
Incorporating UX helps encourage ZT acceptance and adoption within an organization. A key aspect
of this is transitioning from manual processes to code-based automation. By leveraging automation
and code, team acceptance is increased, and the likelihood of human error is significantly reduced.
This shift improves SRE practices. A well-designed UX ensures that security measures are robust and
user-friendly, fostering a more secure and efficient work environment.
SRE combines software engineering and IT operations to build scalable and reliable systems. Focused
on proactive management through continuous monitoring, automation, orchestration and scalability,
SRE planning is a key part of ZT security, helping to maintain system integrity and resilience, includ-
ing early vulnerability detection and efficient resource management.
Applicable to both cloud-based and on-premises environments, SRE’s principles, such as automation,
performance monitoring and incident management, universally enhance system reliability, regardless
of the hosting setup.
Automation and orchestration (AO) are usually coupled terms, enabling ZT improvement in two
important ways. First, AO provide automated feedback that improves access controls, policies, and
enforcement, based on feedback loops.
Second, with infrastructure as code (IaC) and automated compliance checks, automated scripts and
tools can continuously check compliance with ZT policies, ensuring that any deviations are quickly
detected and rectified. AO also enables rapid response to detected threats by automatically adjust-
ing access controls and network configurations in real-time. IaC helps prevent infrastructure drift
– the phenomenon where the live state of the network diverges from the state defined in code. This
alignment is vital for maintaining the integrity of ZT policies.
In ZT security, monitoring the technology stack is crucial for vulnerability detection, with SRE en-
hancing this through continuous system monitoring and logging. This approach enables quick iden-
26
Google. (2016) Site Reliability Engineering.
In the context of ZT security, deploying immutable resources may play a crucial role, and this is
where SRE becomes significant. Immutable resources refer to infrastructure components that, once
deployed, are not modified. Instead, if changes are needed, new instances of the resources are de-
ployed. SRE facilitates this by automating the deployment process, ensuring that new instances are
consistent, reliable, and verifiable. This approach reduces the risk of configuration drift and unautho-
rized changes, aligning well with the ZT principle of “never trust, always verify.” SRE’s focus on auto-
mation and reliability ensures that deploying immutable resources is efficient and secure.
A decisive and swift response may be necessary when a system component is compromised. This
approach is akin to rapidly decommissioning and replacing – effectively and quickly removing and
substituting the compromised component with a new, secure instance. SRE supports this rapid
response strategy with practices like infrastructure as code and automated deployment pipelines.
These practices allow for the quick rollout of new, unaffected instances, minimizing downtime and
exposure to threats. By automating the replacement process, SRE ensures that the response to secu-
rity incidents is fast and reliable.
Aligning ZT with organizational values involves understanding its adoption drivers, like compliance
and security enhancement, and how it offers competitive advantages such as streamlined security
and cost reduction. Risk management is key, focusing on protecting digital assets and requiring clear
ownership for risk handling.
Building a business case for ZT involves assessing financial and performance impacts, gaining
cross-departmental stakeholder buy-in, and aligning it with organizational strategy. Tactics for
ZT implementation include focusing on specific business outcomes, internal security design, and
managing access permissions.
Glossary
For additional terms, please refer to our Cloud Security Glossary, a comprehensive glossary that
combines all the glossaries created by CSA Working Groups and research contributors into one place.
C-Suite Chief-Suite
HR Human Resources
IP Intellectual property
OT Operational Technology
PoS Point-of-Sale
UX User Experience
ZT Zero Trust