Stage 1: Pre–Zero Trust Implementation
In the pre–zero trust stage, organizations typically have traditional, perimeter-based security models with a high degree of implicit trust within their networks. Security controls primarily focus on network boundaries and don’t emphasize least-privilege access or other fundamentals of zero trust.
Perimeter-based security has its pros, but it also has major cons. For instance, this security approach “only distrusts factors outside the existing network,” according to Fortinet. “Once a threat is able to cross the moat and get inside the network, it has free rein to wreak havoc within the castle that is your system.”
WATCH NOW: K–12 schools are taking the “Shrek approach” to cybersecurity.
Stage 2: Awareness of Zero Trust
To advance from the pre–zero trust stage, organizations must assess their present security setups to gain a holistic understanding of their strengths and weaknesses. Next, they should explore new security options to overcome these shortcomings. This can lead to awareness of zero trust.
At this stage, having recognized their weaknesses and the limitations of traditional security models, organizations commonly develop an awareness of zero-trust concepts. To advance along the maturity continuum, however, knowledge is not enough. It must be actualized in the form of adoption.
Stage 3: Early Zero-Trust Adoption
Early adoption is the first stage in the Cybersecurity and Infrastructure Security Agency’s Zero Trust Maturity Model. “This includes manual configurations and assignment of attributes, static security policies and coarse dependencies on external systems, along with manual incident response and mitigation processes,” writes CDW Field CISO John Candillo in a recent white paper. “Currently, this is the stage at which most organizations find themselves.”
DISCOVER: Build a zero-trust model for your network.
During early adoption, an organization may implement zero-trust components such as multifactor authentication or basic identity and access management controls. But to progress further, IT leaders must enact additional zero-trust policies and be strategic about their zero-trust security posture.
Stage 4: Intermediate Zero Trust
According to Cybersecurity Insiders’ 2023 Zero Trust Security Report, 65 percent of cybersecurity professionals prioritize MFA, and 46 percent prioritize identity management and governance — both more than any other zero-trust control. But other controls can be just as significant.