Zero trust has become a dominant security model for the changes brought by mobility, consumerisation of IT and cloud applications. And while the term zero trust continues to infiltrate IT security conversations, it raises an important question: how do we get there?
In this guide, we examine the three pillars of zero trust: Zero Trust for the Workforce, Zero Trust for the Workloads and Zero Trust for the Workplace. We pay particular attention to the journey to achieving Zero Trust for the Workforce, which focuses on making sure users and devices can be trusted as they access applications and systems, regardless of location.
This guide recommends an iterative approach for the journey to Zero Trust for the Workforce. Tightly scope one aspect of the organisation, proceed with that scope through the five phases of the journey and then integrate that scope into the organisation’s zero trust architecture. Those five phases are:
This approach means each initiative is a self-contained project within the larger transformation. To use this guide, within the scope of each initiative, use the following sections for each phase of the journey:
Download this guide as a roadmap to your journey for a zero trust transformation. By following the steps in this guide, your organisation can implement the principles of zero trust and achieve Zero Trust for the Workforce at a sustainable pace.