Zero trust thought leadership group members: Geeta Kapoor (BHSH System), Noah Davis (Trane Technologies), Leon Ravenna (KAR Global), Barney Baldwin (ex-MUFG, Columbia), Chase Cunningham (Ericom), Eve Maler (ForgeRock), Sean Frazier (Okta).
Zero trust (ZT) demands a multiyear commitment that incorporates existing and new solutions across six technology pillars. Leaders have been investing in ZT to become more proactive in risk management, establish security as a source of differentiation and advantage, conserve scarce security resources, and improve business efficiency.
Contributors to this report identify four linked objectives as key drivers for zero trust (ZT) interest and investment. Most agree that CISOs are looking to zero trust as a means of moving beyond a security approach optimized for reacting to vulnerabilities and threats toward a more proactive approach. Some also see ZT as a framework that enables optimization of scarce resources; reduces the number of deployed controls, tools, and vendors; and results in staff time savings. A number of CISOs connect zero trust to business outcomes as well. Some believe that ZT will help their firms drive competitive advantage in areas like scale, speed to market, and customer confidence, while others think ZT will enable business efficiencies. By aligning ZT strategy with one or more of these business drivers, CISOs can build support for ZT in discussions with both executives and IT/security team members.
The thought leadership research group identified four key ZT investment and interest drivers:
Zero trust can support each of these objectives, and the zero trust thought leadership group provided experience-based analysis of the connections between ZT and target business outcomes.
The first three quotes above encapsulate a theme that ran through all our ZT thought leadership group discussions: ZT enables security teams to move from being in perpetual ‘react mode’ to implementing a framework that allows for proactive mitigation of corporate risk.
The second quote expands on this idea that arose in several different conversations by referencing “Whac-a-Mole” – a carnival game in which players scramble to knock down a succession of plastic moles emerging from random holes. CISOs want to establish a framework that enables them to invest in reducing future urgent incidents rather than just remediating problems as they arise; many are tired of continuously responding to a succession of emergency situations.
As the third quote states, an approach that can “eliminate chaos and stop taking resources from planned activities” offers great value to the security function and to the businesses that invest in and depend on security.
The final quote makes an interesting claim – ZT is “an inevitability.” This position is rooted in the belief that “the indirect costs of security risks and breaches” drive much of the current interest in ZT: “Yes, there's a compliance concern, and privacy, consumer sentiment, and regulation feed off of each other. But [more importantly], there's this erosion of believability of data. There's an erosion of how we interact with other people,” tied to the entire concept of consent. ZT, the contributor believes, responds to this need to view interactions as authentic and to combat a sense that the data we access is, in some way, corrupted – a sense that would erode the underpinnings of digital business.
Reactive security highlights opportunity for a ZT framework. Not exactly as pictured. [photo credit: Sarah Stierch (CC BY 4.0)]
Research contributors also discussed the sense that zero trust adoption ties directly to competitive advantage and market differentiation. Thought leadership group members claimed that a proactive approach – enabling the business to align security with a constantly changing mix of inputs, assets, demands, and external threats and regulatory pressures – could support key enterprise objectives, including speed to market, the ability to operate at scale, and increased consumer confidence.
The final quote addresses a separate aspect of competitiveness: the ability to attract younger workers who – accustomed to features like built-in smartphone biometrics – may chafe at authenticating via traditional VPN/perimeter-based security features. The thought here is that by “meeting users where they live” – incorporating familiar security features into the ZT fabric rather than channeling users through a rigid (and outdated) authentication process – businesses can both appeal to younger workers and reduce the risk of workarounds that negatively impact the corporate security posture.
The challenge of fully staffing security teams often arises in Stratascale research projects and executive discussions. CISOs are constrained by the talent shortage. They expect this shortage to continue and seek ways to streamline processes and introduce automation to mitigate the talent shortfall.
Zero trust frameworks accommodate both process and automation objectives. By integrating security initiatives across the six pillars, ZT reduces the need for duplicated effort, and by focusing on proactive solutions to pervasive challenges, ZT helps security teams avoid some of the reactive activity that diverts attention from strategic initiatives.
At the same time, some of the most important ZT focus areas – including identity and device management, network, and data segmentation, DevSecOps, attack surface management, and data security measures – use automation to reduce human error and facilitate orchestration across complex processes. ZT aligns new automation with existing systems and helps CISOs direct staff resources toward issues with the greatest need for human attention.
The issue of cost and zero trust, which we address more fully in Stratascale’s reporting on “Key Considerations in Zero Trust Deployment,” attracts a great deal of attention. The statements “building a zero trust architecture will cost a great deal of money” and “cybersecurity is an expensive but necessary capability, regardless of an organization’s zero trust status” are both true. The question isn’t whether ZT deployment will entail expenditures but whether the cost will be less (or value, greater) for firms that invest in ZT than for those that pursue other paths.
While “proactive risk management” was the most frequently cited ZT interest and investment driver in our expert interviews, “establishing security as a source of business efficiency” was probably the most vigorously discussed. CISOs believe – strongly – that zero trust enables them to have a significant positive impact on process timeliness and cost.
The first two quotes above relate directly to this central point. Security as a corporate capability is most important when it ties directly to business objectives, particularly around enabling agility and the capacity to change. Some level of security investment is a constant in a digital business world; the key to demonstrating value is to meaningfully connect investment to compelling outcomes. Per the third quote, ZT helps to facilitate this connection in tangible ways – for example, by streamlining processes associated with access and authorization.
The fourth quote speaks to the idea that in some industries – and though it’s not included here, across virtually all large companies – performance of critical functions and possession of sensitive data makes the organization a target for attackers. Business leaders understand this and are likely to understand the importance of effective cybersecurity defenses; moving forward, the contributor added, they are also likely to recognize zero trust as an enabler of digital transformation.
The final bullet raises an interesting issue. Granularity, or the ability to consider inputs like telemetry signals at varying levels of specificity, is likely to emerge as a critical factor in future security frameworks. Thought leaders (including contributors to this report, and many others, including the Executive Office of the President) [1] see granularity as an important factor in optimizing security – and as an important attribute of zero trust.
CISOs looking to integrate this perspective on zero trust within executive-level strategy discussions can use the following challenges/constraints and takeaways to inform their approach.
[1] See for example Memorandum M-22-09: https://www.whitehouse.gov/wp-content/uploads/2022/01/M-22-09.pdf
This is the third of eight source documents included in Stratascale’s “An Executive Guide to Zero Trust” research series. We will also publish a capstone report connecting these eight pieces; a six-part companion series (“The Technical Manager’s Guide to Zero Trust”); and several compilations, ancillary documents, and tools. Readers interested in specific executive-level perspectives on zero trust may wish to explore the other publications in this series:
Readers interested in specific executive-level perspectives on zero trust may wish to explore the other publications in this series: