Gearing Up for Zero Trust

As our team at LayerArch prepares to engage with customers to solve their security and networking pain points and guide them towards the Zero Trust architecture, there is no better place to start than with the most authoritative standard body and agency for Zero Trust: NIST (National Institute of Standards and Technology) and CISA (Cybersecurity and Infrastructure Security Agency). While NIST developed the most influential framework on Zero Trust, CISA used it as a base and developed the Zero Trust Maturity model.

“Zero Trust is a new security philosophy and a business survival strategy in the age of automated attack vectors that happen at machine speed.”

NIST publication NIST-SP-800-27 is the architectural standard for Zero Trust and a cybersecurity framework developed to remove the implicit trust from the network connections. Its core principles—namely, (a) Never trust, always verify; (b) least-privilege access; and (c) continuous validation—focus on 5 core pillars to strengthen the security posture of an organization. These 5 pillars span user identity, device, network, application workloads, and data.

NIST Zero Trust framework and architecture resulted from decades of messy IT reality that relied on the perimeter defense model or rather, the castle-and-moat approach. This old model relied on implicit trust once the user logged into the network, allowing lateral movement across resources that has resulted in multiple major cybersecurity breaches. The recent attacks, SolarWinds and Colonial Pipeline, involved hackers using lateral movement from compromised hosts to data exfiltration and ransomware, resulting in combined financial losses exceeding $100 million.

Zero Trust architecture is not a one-size-fits-all approach and is purely based on the risk appetite of the organization. It is a combination of both technological and cultural shift and a multi-year migration journey for many enterprises.

LayerArch’s Zero Trust Maturity Assessment (ZTMA)

LayerArch Zero Trust Maturity Assessment

In order to help enterprises establish a ZT baseline, our team at LayerArch has developed a lightweight Zero Trust Maturity Assessment (ZTMA) that scores ZT maturity across all the 5 pillars of the ZT model — user identity, device posture, network, applications and workloads. These 5 pillars and associated functions documented in CISA’s ZT maturity model have been translated into questionnaires to find the maturity stage: Traditional, Initial, Advanced, and Optimal.

By answering 25 critical questions, customers will receive:

  • A maturity score across the 5 ZT Pillars (Identity, Device, Network, App, Data).
  • A customized strategic recommendation for your specific environment.
  • A roadmap to move from “Traditional” to “Optimal” posture.

Join our inaugural cohort of participants and start building a more resilient organization today. Get started with the Zero Trust Maturity Assessment →

Guru Bettadapura

About the Author

Guru Bettadapura is the founder of LayerArch Systems, a firm specializing in the intersection of networking and security. He brings over two decades of experience in enterprise networking, security architecture, and digital infrastructure transformation. Guru holds CISSP, CCSP, and CCNP certifications, mechanical engineering degree and MBA from the University of Illinois.

LinkedIn Profile

Leave a Reply

Discover more from LayerArch Systems

Subscribe now to keep reading and get access to the full archive.

Continue reading