Intelligent CIO APAC Issue 10 | Page 83

FINAL WORD
Forrester anticipates that at least one government in Asia Pacific will embrace a zero trust cybersecurity framework in 2021 .
Yet for all its rewards , zero trust implementation is a complicated endeavour . Apart from the technical challenges , success depends on engaging and activating multiple stakeholders from across the business and providing a lot of user hand holding .
This article will help tech leaders get their bearings with zero trust as they start to think about how they might implement it themselves .
Exploring the technical aspects of zero trust
In practical terms , effective zero trust implementation requires not just technology , but also policy and process . It ’ s not a switch which IT teams can flip or a product or service that they can buy , but it does require a blend of tooling distinct from that used in traditional perimeter-based security .
Wrapped around these solutions are strict policies defining which users and devices can access which resources ; there can be no more free and open access . Defining these policies and enabling their implementation can be a heavy lift . It requires the understanding of application workflows and dependencies , but there are automation and AIbased solutions to ease some of the burden and the benefit to both security and operations is worth the effort . Zero trust security relies on identity and access management , endpoint control and a mature security monitoring capability .
It is a must to bring people along on the zero trust journey
It ’ s important to recognize that implementing zero trust crises crosses team boundaries throughout the organization . It draws in security , network and identity access management ( IAM ) teams , along with asset
Effective zero trust implementation requires not just technology , but also policy and process .
www . intelligentcio . com INTELLIGENTCIO APAC 83