Members of the zero trust thought leadership group agreed that “ZT is not a product”—it’s a strategy, a framework, and/or the journey to implementing that strategy or framework. But the steps on this journey are often defined by technology initiatives.
CISOs will aim to instantiate overall zero trust benefits with terrain-level investments and activities. CISOs can make this connection by articulating which technologies and associated management imperatives are important to the ZT path, how these support broader ZT objectives, and why an incremental approach optimizes the value of currently deployed and new technologies.
Despite the claims of vendors touting a wide range of security products, zero trust isn’t defined by technology—it is best thought of as a strategy that involves a long-term action plan. This plan involves technologies, capabilities, and related practices at the execution level. Each company will build its own unique roadmap, considering its current maturity, environment, timeframes, and budget priorities.
Many executives, however, face pressure to express ZT strategy in terms of technology roadmaps. To address this need, a team of Stratascale SMEs identified the most important technologies, capabilities, and practices in each of the six ZT pillars. Understanding where to focus in each area helps CISOs plot a course that addresses the entire corporate ZT posture. Using this guidance, security leaders can ensure that they have measures in place to respond to requirements across the digital business’s protect surface.
Click here to access the Stratascale Executive Guide to Zero Trust report, “Key Zero Trust Technologies and Management Imperatives”