Zero trust thought leadership group members: Geeta Kapoor (BHSH System), Noah Davis (Trane Technologies), Leon Ravenna (KAR Global), Barney Baldwin (ex-MUFG, Columbia), Chase Cunningham (Ericom), Eve Maler (ForgeRock), Sean Frazier (Okta).
To date, zero trust (ZT) champions have been security rather than business leaders. There are signs that this is changing – and that the change will bring about better outcomes.
To date, ZT champions have tended to be CISOs rather than business leaders. Increasingly, though, non-technology executives – particularly those with risk, compliance, and privacy responsibilities – are sponsoring ZT within their organizations. This is an important change, as senior leadership team (SLT) backing is essential to organization-wide ZT success. Security leaders looking to build executive support should express the ZT strategy regarding business outcomes without relying on technical language. Organizations must recognize that compliance, risk management, and privacy are business issues, not security problems. Security leaders who position ZT in terms of its ability to reduce friction and enable agility are most likely to win executive endorsement for ZT.
Zero trust sponsorship has been shifting. CISOs have been the primary sponsors for ZT initiatives in most organizations and continue to drive ZT within most companies today. But there is a groundswell of ZT leadership from outside the security function – and the zero trust thought leadership group identifies this business sponsorship as an essential step in positioning ZT as a business rather than a security concept.
Should security leaders raise the topic of zero trust for discussion with senior executives? Contributors shared a wide range of perspectives. Some members of the thought leadership group opted to emphasize the benefits of executive buy-in to ZT activities. Others highlighted current knowledge gaps, noting that while executives have some interest in the concept, they have next to no understanding/awareness of what zero trust entails from a time, cost, or activity perspective.
Substantial executive backing for ZT is relatively recent. Multiple contributors cited the Biden Administration Executive Order 14028 (12 May 2021) as a key event triggering executive interest in ZT. Other contributors avoid discussing “zero trust” with SLT and board of director members altogether, noting that “they're already trained on what NIST means. So, where does zero trust fall within those frameworks? Which gaps is it filling?” There is also, these experts believe, exposure associated with ZT as a concept, as leadership may ask, “if we are [investing in] being more proactive, how can we reduce budget or resources on the reactive side?”
Contributors on all sides of this issue emphasized the benefit of committing to an enterprise-wide ZT strategy. One contributor pointed out, “Organizations that [implement] zero trust in pockets will not realize its benefits. The narrative will turn to, ‘zero trust isn’t working right.’” Firms that commit to a cohesive end-to-end strategy will realize benefits, while those that dabble will conclude that ZT isn’t worth the investment.
In cases where ZT has obtained business backing, support originates with executives who have risk, privacy, or compliance obligations. In these scenarios, security leaders can act as advisors and enablers, supporting objectives that concern the business as a whole. As one contributor said, ZT “can't just come from IT…[CISOs can say] you need to fix your business processes. But this means making [security generally, ZT specifically] a priority from a risk perspective,” rather than strictly as an IT objective.
If Zero Trust aligns so well with executive priorities, why do CISOs often struggle to obtain executive sponsorship? Contributors point to the disconnect between security objectives and business objectives.
These observations point to gaps in both perception and reality. In fact, not every CISO will eschew user convenience to increase the number of controls. Still, the fact that this perception exists suggests that this characterization is at least sometimes accurate. And it is certainly true that some business units succeed with sub-optimal IT support, and quite likely true that leaders of these units will push back on increased constraints from or budget allocations for a security/IT function that has been less than completely responsive to their needs.
Putting the emotions reflected in the statements aside, there is scope for better alignment of controls with real threats. One expert noted, “we end up adding all the friction to our actual users and very little friction to our attackers. If we think about things from a user experience perspective, we want to add less friction to our users and more friction for our attackers – and that very much aligns with zero trust philosophies.” CISOs who can draw this distinction improve their prospects of building credibility with skeptics in the business.
Even within the IT function, misaligned incentives can lead to tension. The CISO’s interests are best served by “pipes closed” – strict limits on access and data ingress and egress. The CIO, on the other hand, is more directly aligned with business colleagues and will consider “pipes wide open” – ubiquitous, flexible employee access to assets across and outside the corporate environment and customer and supplier access to internal systems – as a preferred end state.
One contributor was asked, “Where does the board sit on this? Are they in favor of making things as fluid as possible for the user community, are they in favor of making things as locked down as you'd like to see as a CISO, or are they somewhere in between?” The response made it clear that neither the CIO nor CISO agenda shapes board priorities: “it's always going to be somewhere in between,” the expert stated. “It's all about managing an acceptable level of risk.”
The most effective path to building a case for executive support for ZT is to focus on business objectives and avoid deep, technical discussions of key technologies and implementation imperatives.
The first quote above observes (correctly) that compliance is not ultimately the responsibility of the security leader – that it is “owned” by legal and business executives. The final quote marks an intriguing alternative path to building executive endorsement of ZT: emphasizing security objectives that are considered important by stakeholders throughout the organization. This contributor stated that “the two terms I use a lot are ‘frictionless security’ and ‘the flexible future.’”
The key, this CISO believes, is to “end up making [ZT] their [the executives’] idea,” through repetition of terms that resonate. “I know I've won,” this SME stated, “when my leaders or other people start repeating my phrases back to me and think it's their idea.” In this way, the CISO obtains executive endorsement for the (relabeled) ZT journey, building top-down support for the evolving deployment by aligning tightly with business imperatives. “Fundamentally,” the CISO observed, “what you’re trying to get to is frictionless security. That helps enable your business – and it enables [the business] to be flexible to meet the needs of customers.”
CISOs looking to integrate this perspective on zero trust within executive-level strategy discussions can use the following challenges/constraints and takeaways to inform their approach.
This is the second of eight source documents included in Stratascale’s “An Executive Guide to Zero Trust” research series. We will also publish a capstone report connecting these eight pieces; a six-part companion series (“The Technical Manager’s Guide to Zero Trust”); and several compilations, ancillary documents, and tools. Readers interested in specific executive-level perspectives on zero trust may wish to explore the other publications in this series:
Readers interested in specific executive-level perspectives on zero trust may wish to explore the other publications in this series: