Intelligent CISO Issue 39 | Page 75

Effective Zero Trust implementation requires not just technology , but also policy and process . team boundaries throughout the organisation . It draws in security , network and Identity Access Management ( IAM ) teams , along with asset owners and admins and application owners .
worth the effort . Zero Trust security relies on identity and access management , endpoint control and a mature security monitoring capability .
It is a must to bring people along on the Zero Trust journey
It ’ s important to recognise that implementing Zero Trust crises crosses

Effective Zero Trust implementation requires not just technology , but also policy and process . team boundaries throughout the organisation . It draws in security , network and Identity Access Management ( IAM ) teams , along with asset owners and admins and application owners .

This kind of scope means the CIO / CTO will often be the lead , with the CSO / CISO a critical contributor thanks to their perspective on risk management .
Organisations must also invest time in awareness building and socialisation of the benefits of Zero Trust , creating detailed FAQs and sharing them via company newsletters and intranets with plenty of links to resources .
Trust us : education and communication before rollout can save businesses a lot of help desk pain as their policy and process changes start going live .
Start small , start critical – and utilise DevOps
Businesses can get off on the right foot with Zero Trust by starting small to build a series of incremental but highly visible wins . They may want to start with access control and then move inwards towards more complicated data centre implementations . If IT teams start with a baseline across their environment , they can add to this as they discover and classify workload and data .
At the same time , start lining up technology solutions and their configurations . Understand the requirements and select partners to help integrate appropriate technologies to provide for authentication , access control , micro segmentation and monitoring . www . intelligentciso . com
75