Overcoming The Common Pitfalls Organisations Encounter When Adopting Zero Trust

Ryan McConechy

Chief Technology Officer

As cybercrime continues to intensify against all industries, many of today's forward-thinking organisations have turned to Zero Trust to limit their exposure to attack.

Zero Trust flips the traditional 'trust but verify' ethos. Instead, nothing in the digital infrastructure is trusted inherently, and all employees, applications and devices are given the minimum number of privileges required to perform their jobs.

This offers many security benefits to organisations, minimising the blast radius of attacks and limiting the chances of criminals exploiting a user or vulnerable device and then escalating their privileges to travel across the network before executing ransomware or performing a data breach.

However, because Zero Trust is a relatively new security concept, many organisations need help adopting it.

Zero Trust is not a 'set and forget' security approach; it's not a product that can be switched on or off. Instead, it's a journey that can take many months and must be managed continuously. The ultimate goal is for Zero Trust to become embedded in an organisation where policies can be efficiently applied as a business grows through people and technology.

So, what are the most common mistakes organisations make on their journey to Zero Trust, and how can they be avoided? 

Fail to prepare, prepare to fail

The most prominent hurdle organisations encounter with their Zero Trust deployments is a failure to prepare properly. This leads to surprises along the way or a lack of budget to execute the entire project effectively.

Having a strategy well defined before adopting Zero Trust is essential; this includes deciding what needs to be brought into the scope of Zero Trust, setting out deployment milestones, allocating the correct budgets for the project, as well as a plan around execution: Zero Trust Architecture can't be achieved overnight, it is a methodology that takes time to develop and mature fully.

You can't protect what you can't see

Visibility is an essential element of Zero Trust, as security teams must be able to see all assets on the network for it to function correctly.

A lack of visibility is a common pitfall organisations encounter when migrating to Zero Trust. It can seriously impact their adoption, leading to blind spots that adversaries could exploit.

On the journey to Zero Trust, organisations must ensure they have visibility of all devices, users and applications running on the network so they can set a baseline for acceptable behaviour.

From a user perspective, this involves understanding who users are, where they are logging in from, at what time of day they are logging in, what they are accessing, and what devices they use to access the corporate network. From a device standpoint, this means understanding what devices do, what they are connected to and what is classified as acceptable behaviour for each device. From an application perspective, this involves understanding what components should communicate with each other and what protocols are standard for these communication pathways.

Suppose organisations don't carry out this analysis before Zero Trust is adopted. In that case, this can impact employee productivity, which can, in the worst cases, lead to executive decisions to cancel the project entirely.

This is something which must be avoided.

Disparate vendors can lead to gaps

Another critical challenge organisations can encounter is adopting solutions that don't integrate well into their Zero Trust project. This can lead to gaps or cause problems with the adoption that cause it to stall or fail.

Organisations must assess solutions in the planning stages of their Zero Trust journey to ensure all the products integrate correctly and don't lead to gaps.

Complacency leads to breaches 

Another critical risk organisations must work to avoid is a failure to test their Zero Trust adoption. If organisations don't test the policies they establish, they could be misconfigured, leading to breaches.

Organisations must test by trying to circumvent their Zero Trust policies, which must all fail. Employees should never have a way to bypass Zero Trust; when adopted correctly, it should be imposed on users and never something they can decline to use.

When organisations don't run this testing, their complacency could lead to breaches.

Zero Trust should become a standard business process 

Zero Trust shouldn't cause many disruptions to a business's efficient running.

In the adoption stages, organisations will encounter problems; they will never get it perfect the first time, but any policy tweaks should be remedied quickly without seriously impacting employee productivity.

The end goal for any Zero Trust project is for it to become engrained in the business. When new users come on board, or new systems are introduced, the organisation should eventually come to a place where it can easily and quickly apply Zero Trust policies, either because it has done it before or because it already has templates or policies to reuse.

It should become a standard business practice, that is routine to the security team, while going largely unnoticed to employees.

Organisations can use AI tools to support this, where the technology automates Zero Trust policies on users and devices as they are onboarded.

Zero Trust offers many benefits to organisations, but adoption takes time. Planning is critical, and when organisations do this well, they are more likely to succeed with their projects, allowing them to reap the full benefits Zero Trust offers.

Barrier's Approach to Zero Trust:

At Barrier, our commitment goes beyond mere consultancy. We empower organisations to discern and embrace their unique journey towards Zero Trust. By intertwining innovative solutions with tailored insights, we seek to foster business resilience, drive sustainable growth, and reinforce stakeholder confidence. Every organisation deserves a security framework that's both robust and adaptive. We're here to ensure yours is.

Next
Next

Building out Zero Trust Architecture