Prescriptive Zero Trust- Assessing the impact of zero trust on cyber attack prevention
By: Samuel Aiello
Potential Business Impact:
Measures how well companies protect themselves online.
Increasingly sophisticated and varied cyber threats necessitate ever improving enterprise security postures. For many organizations today, those postures have a foundation in the Zero Trust Architecture. This strategy sees trust as something an enterprise must not give lightly or assume too broadly. Understanding the ZTA and its numerous controls centered around the idea of not trusting anything inside or outside the network without verification, will allow organizations to comprehend and leverage this increasingly common paradigm. The ZTA, unlike many other regulatory frameworks, is not tightly defined. The research assesses the likelihood of quantifiable guidelines that measure cybersecurity maturity for an enterprise organization in relation to ZTA implementation. This is a new, data driven methodology for quantifying cyber resilience enabled by the adoption of Zero Trust principles to pragmatically address the critical need of organizations. It also looks at the practical aspects ZTA has on capabilities in deterring cyberattacks on a network. The outcomes of this research define a prescriptive set of key technical controls across identity verification, microsegmentation, data encryption, analytics, and orchestration that characterize the comprehensive ZTA deployment. By evaluating the depth of integration for each control component and aligning to industry best practices, the study's results help assess an organization's ZTA maturity level on a scale from Initial to Optimized adoption. The research's resultant four tier model demarcates phases for an organization on its security transformation journey, with each tier adding to the capability of the last.
Similar Papers
The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation
Cryptography and Security
Keeps computers safer by checking everyone always.
Zero Trust Architecture: A Systematic Literature Review
Cryptography and Security
Makes computer systems safer by always checking who's using them.
Rethinking trust in the digital age: An investigation of zero trust architecture's social consequences on organizational culture, collaboration, and knowledge sharing
Emerging Technologies
Makes computer security work better with people.