Cover Image for Identity and Devices: The Best Starting Pillars of Zero Trust
Article

Identity and Devices: The Best Starting Pillars of Zero Trust

05.16.23 | By Ascent

The countless resources on Zero Trust and limitless potential starting points make it challenging to clarify the right steps to take to enhance overall security. Within the pillars of Zero Trust, identity and devices are strong places to begin making meaningful security changes. These two pillars deliver the greatest immediate security impact, they are universally relevant for every company, and they help teams focus on the important challenges instead of the lesser ones that resolve themselves over time.

Overview: Pillars of Zero Trust

Several sources exist on the pillars of Zero Trust, but they vary on their assessment of what the pillars are. Forrester summarizes the pillars as:

  1. Identity
  2. Devices
  3. Network
  4. Apps
  5. Data
  6. Infrastructure

Three overarching interactions across the pillars are incorporated into every stage of optimization. These are:

  1. Visibility and analytics
  2. Automation and orchestration
  3. Governance

This framework for Zero Trust defines the architecture for any organization pursuing a greater security posture. Identity and devices are two of the most commonly discussed pillars because they are relevant starting points for nearly every organization.

Identity as a Universal Starting Pillar in Zero Trust

While the Zero Trust journey unfolds differently for every firm, the identity pillar is a beneficial place to start for a few reasons.

First, stronger identity practices address the most common cause of data breaches — social engineering that coerces well-intending employees to share private information. Second, the initial steps teams take within identity in the beginning of their Zero Trust journeys set the foundation for more advanced security measures down the road, such as granular authentication and identity-based authorization.

Last, starting with identity brings benefits that end users can experience for themselves. This helps teams earn greater buy-in to continue making progress on Zero Trust. Advancing in the identity pillar means streamlining sign-on with SSO, authentication tools, or passwordless sign-in such as biometrics. This reduces the number of repetitive logins or password memorization needed by employees, ultimately enhancing their productivity and lowering daily friction.

When prioritizing the steps in Zero Trust, make sure decisions are rooted in science to define the actions that deliver the greatest security impact in the shortest amount of time.

Example of Identity Pillar Maturity Model

The Cybersecurity and Infrastructure Security Agency (CISA) defines the maturity of the identity pillar in Zero Trust as the following:

  • Traditional: Password of multi-factor authentication (MFA); limited risk assessment
  • Advanced: MFA in place; some identity federation with cloud and on-premises systems
  • Optimal: Continuous validation; real-time machine learning analysis

Achieving the optimal stage is a far-fetched objective for many organizations. Focus efforts on more attainable goals by enhancing identity processes incrementally. What we’ve summarized here is a reference point for how the identity pillar might progress in an ideal scenario, but the actual steps teams take must be rooted in data-backed risk analysis.

Enhance Remote Security with the Devices Pillar of Zero Trust

Hybrid work took the world by storm. Modern employers are recognizing remote work as a competitive advantage and shifting their focus to a hybrid-first model. While this trend has eased remote access for employees, it increased the vulnerability of firms for cyberattacks.

Today’s remote employees want to use their own devices and access critical applications quickly, regardless of their physical location. These shifts in modern work make the devices pillar of Zero Trust a great starting point for organizations.

Enhancing device security addresses common entry points for threat actors, specifically unmanaged devices on remote networks. It also grants greater visibility into devices and activity across the network, which leads to several benefits, including consistent monitoring for suspicious activity and bringing efficiency to auditing devices and permissions on a regular basis.

The hybrid-first necessity forced many firms into digital transformation quickly. Now is the time to review systems, refine them, and implement best practices.

Example of Devices Pillar Maturity Model

CISA defines the maturity of the devices pillar in Zero Trust in the following progression:

  • Traditional: Limited visibility into compliance; simple inventory of devices
  • Advanced: Compliance enforcement employed; data access depends on device posture on first access
  • Optimal: Constant device security monitoring and validation; data access depends on real-time risk analytics

When looking at the evolution of Zero Trust, teams who think of it as an ongoing commitment to changing and adapting are more successful with their overall security posture. Zero Trust is a strategy that can always be incrementally improved. Therefore, IT teams need to determine which steps make the most sense to protect against probable threats to their business.

Define Your Next Steps within the Pillars of Zero Trust

Defining the most applicable steps forward in a Zero Trust model is a common challenge firms face. Zero Trust strategies need to be rooted in the hard science of risk analysis. Only by having data to back up decisions can IT teams be certain the steps they’re taking will bolster their company’s security posture.

Identity and devices are strong starting pillars in Zero Trust, but the actions each organization takes within these pillars will be unique. Specific steps over generic actions are the key to success with cybersecurity.

A Zero Trust assessment such as Ascent Solutions’ Zero Trust Launchpad can define the recommended steps forward for your organization. Managed security providers empower teams with data-driven decisions, bringing momentum to cybersecurity initiatives. To learn more about Ascent’s Zero Trust Launchpad and request a consultation, reach out to info@meetascent.com.

Share this Post
Whether you’re starting your cybersecurity journey or you’re improving your security posture, our team is passionate about protecting your people and business.
content
Blog
Right-sized Security: Choosing Managed Services for Your Business

April 17, 2024 – Managed security is cost effective, but sometimes the range of services offered feels overwhelming. Read on for a right-sized approach.

content
eBOOK
Enable Secure, Compliant, and Responsible AI Adoption

March 16, 2024 – Microsoft Copilot for Security is at the forefront of a Gen AI-driven revolution in cybersecurity. Here’s what to consider before adopting:

content
Blog
3 Questions to Ask Before Consolidating Your Security Stack

March 26, 2024 – Security teams can improve the economics of their security strategy in two ways: tool costs and employee time. Platform consolidation addresses both.