0% found this document useful (0 votes)
185 views16 pages

Deloitte Cyber Zero Trust

Uploaded by

mgonzales
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
185 views16 pages

Deloitte Cyber Zero Trust

Uploaded by

mgonzales
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Zero Trust

A revolutionary approach to Cyber


or just another buzz word?

2021
Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Despite the recent marketing hype, the


concept of Zero Trust is not new – in fact,
academics have spent the last 20 years
debating the advantages and challenges of a
security model that is based on the principle of
never trusting and always verifying. It’s only
been in the last few years that the technology
has started to catch up, making this once
theoretical model a reality and generating lots
of excitement, with vendors bringing new
products to market with big claims and
game-changing promises.
Through this document, we will look beyond
the hype and break down what Zero Trust is,
the business drivers behind it and the benefits
it can bring. We will also explore approaches to
Zero Trust, what the journey feels like and
share some common pitfalls and challenges
along the way.

© 2021. For information contact Deloitte LLP 2


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Why Zero Trust?


The drivers and trends putting Zero Trust on the agenda

In recent years, Zero Trust has become somewhat of a buzz word within industry circles, with lots of attention
placed on how this innovative approach to cyber security can help organisations to defend against the new
generation of attackers – who are better networked, more organised and who have access to tools that only a
few years ago were the preserve of nation state actors.
However, there are a broader set of business drivers and demands, which are pushing Zero Trust onto the
corporate agenda and highlight the need for greater speed and adaptability in how organisations approach
cyber security, as they seek to survive and thrive in an increasingly digital world.

What is driving the move to Zero Trust?

The rapid pace of digitalisation is Adversaries are becoming more


increasing IT complexity and driving sophisticated and are outmatching
up cost current cyber defences

The development of digital products and The shift to the Cloud is demanding a new
services is being constrained by rigid approach to securing critical business
cyber security controls data

An increasingly mobile workforce now The demand for better and easier
expect to be able to work from anywhere, business collaboration requires a more
on any device agile approach to security

The cost of compliance is rising due to The proliferation of Shadow IT is


overlapping and rigid controls, and more increasingly hard to contain without
strenuous requirements damaging business agility

Securely managing Mergers and Increasingly complex vendor landscapes


Acquisitions is increasingly complex, time and supply chains require a more efficient
consuming, and costly approach to security

Understanding your drivers to embarking on a Zero Trust journey will help shape the
path you take

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Introducing Zero Trust


What does it really mean?

Zero Trust is a framework for looking at Cyber Security in a new way. Based on the fundamental principle of
“never trust, always verify”, Zero Trust moves away from the traditional perimeter-based concept of managing
security, to one where trust is established between individual resources and consumers, as and when needed.
Trust is determined based on a combination of internal and external factors and is constantly revalidated.
Zero Trust releases the shackles from IT, enabling businesses to strip away cumbersome and expensive security
controls, and build a more dynamic, efficient and customer-orientated technology platform.

…Much more than just


technology. It is a framework
that integrates a range of
adaptive and next-generation
capabilities
…An out of the box
technology solution

…Transformative. Re-imagining
how you manage cyber and
unleashing it, to better align to
the way you do business

Zero Trust is a new way of thinking about security based on the principles of “never trust,
always verify” – aligning the way you do security to the way you do business

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Key Concepts
How does it work?

Supportive Mechanisms

Behaviour
analysis Security
Policies
logs
Identity
Threat
(Directory,
Intelligence
IDP)

Policy Engine
Continuous Historical
monitoring Data

Establishing Establishing
Trust Trust

Consuming Entities Validation Decision Providing Entities


Users Cloud

X
Data
IT/OT/IoT ✓
? Devices
Devices Policy Enforcement OT/IoT

Dynamic Session Access Applications

All communications, regardless of location, are treated from the same starting point of
having no inherent trust. Trust is established by a dynamic policy, informed by a range of
signals – from behavioural analytics to threat intelligence - and is constantly revalidated

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Benefits of Zero Trust


Should we believe the hype?

There is a lot of excitement around Zero Trust with big claims made by vendors about the benefits that it can
bring – but should we believe the hype? While it is certainly not a silver bullet, Zero Trust can unlock a range of
opportunities for organisations by better aligning security to how they do business, reducing risk, improving
agility and driving down operating costs – however these benefits are hard won and require support and
commitment from across the organisation to truly be realised.

The benefits of Zero Trust

Enabling the modern workplace


Supporting the ‘new normal’ and enabling employee productivity, by reducing friction and
providing secure and flexible access

Supporting digital products and services


Using Zero Trust principles to securely develop digital products and services and
enable the transition to Industry 4.0 – creating a head start against competitors

Reducing and managing risk


Enhancing the ability to detect and respond to threats in real time and reducing
the blast zone of attacks by restricting lateral movement

Sustainably reducing cost


Reducing security costs by minimising IT complexity through automating, simplifying
and standardising the way we do cyber

Enhancing business agility


Enabling faster and secure innovation, greater business agility, and easier and more efficient
integration with partners and third parties

While Zero Trust can help unlock a range of benefits, to truly realise its potential you
need to approach it methodically, with a clear line of sight to how Zero Trust will deliver
these benefits for your organisation

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Zero Trust functional architecture


Taking a look under the bonnet

Deloitte’s Zero Trust functional architecture is aligned to NIST’s Zero Trust Architecture standards (SP 800-207)
and is designed to provide an end-to-end view of the key components and how they interact in a Zero Trust
environment.

Zero Trust functional architecture

Adaptive Cyber
(Organisational Design and Change, Cybersecurity Training and Awareness)

Architecture and Governance


(Vision, Strategy, Roadmap, Enterprise and Solution Architecture, Standards and Principles)

Consuming entities Network Providing entities


(Anywhere, anytime) (Transport and Session Underlay) (Anything, anytime)

Policy Management and Integration

Policy Decision Point (PDP)

Policy Engine (PE)

Identity Information
Identity (User, Device and Application, IDP) Identity

Identity-based Historic
policies Information

Resource-based Threat Intel.


policies and Security Logs

Session Continuous
policies Monitoring
Workloads Workloads
Enterprise policies Contextual Data
(Non-exhaustive) (Non exhaustive)

Policy Administrator

X X
Devices Data

Policy Enforcement Point (PEP)

Operations
(Detection and Response, Security and Event Monitoring, Security Orchestration)

Deloitte’s Zero Trust functional architecture helps provide a target state for the end-to-
end Zero Trust vision

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Unlocking Zero Trust's potential


Building a successful Zero Trust programme and delivering business outcomes

The adoption of Zero Trust should be viewed as an organisation-wide journey, that is as much about
repositioning how we approach and manage cyber risk across the organisation as it is about evolving
technology capabilities. At Deloitte, we use a framework which encompasses nine foundational domains which
help to shape the Zero Trust journey and deliver desired business outcomes

Architecture and Governance


Enterprise architecture and contextual and To: contextually-aware, simpler
From: static, complex and reactive
dynamic security policies for the adoption of and dynamic enterprise security
security architecture
Zero Trust architecture

Network
Private networks retired and use of public
From: private network with To: use of public networks with
networks and micro-perimeter based legacy
enterprise-wide perimeter resource/services perimeter
services*

Identity
To: consolidated identity stores
Consolidated identity technologies and From: disparate identity stores and
(e.g., Identity providers and Trust-
processes to enable adaptive access pre-defined static access
based access)

Operations
From: reactive, pre-defined metric
Predictive and preventative security tooling and To: predictive, monitoring and
measurement and manual
automated processes automated response
response

Devices

Real-time assessed device trust level based on From: pre-defined or accepted To: dynamically assessed device
device health and additional criteria device trust level trust based on multiple criteria

Workloads

Context-aware access using defined trust levels From: static predetermined access To: dynamic access based on health
to applications, secured with micro-perimeters and an inherited trust model and other criteria​

Data

Trust levels based on enterprise-wide From: varied data type and To: enterprise-wide classification
classification of data sensitivity classification of data-based value and sensitivity

Policy Management and Integration


From: siloed security To: centralised security policy
Centralised security policy management and
policy management and static management and dynamic policy
dynamic enforcement for resources
controls enforcement

Adaptive Cyber
From: static cyber organisation, To: shared accountability for cyber
Dynamic security organisation closely aligned to
disconnected from the business, and continuous collaboration
business priorities and continuously adapting to
without clear ownership of cyber amongst teams to deliver business
the internal/external environments
risk goals

Zero Trust programmes involve much more than just technology and require the
integration of a broad set of capabilities to realise its full potential

© 2021. For information contact Deloitte LLP * Click here to read Deloitte's point of view on the evolution of 'Enterprise Network Security Architecture'
Zero Trust | Revolutionary approach to Cyber or just another buzz word?

The journey to Zero Trust


What does it feel like?

The journey to Zero Trust is different for every organisation and will be shaped by your business priorities, the
benefits you are seeking and your ambition to change. This is what that journey may feel like:

Traditional 1
We have built components of Zero
Trust but didn’t know it. We are
lagging behind the competition,
with a flat, expensive and complex
network that is frustrating to
navigate and manage
2 Foundations
We are seeing early improvements
to key tools and technologies. We
understand where we are going and
how we are going to get there

Essentials 3
It's easier to get things done. New
staff and partners are quickly on-
boarded. Workplace feels more
modern and new tools are available

4 Advanced
We are working as a truly cloud-first
company, collaborating and co-
creating seamlessly and securely
with clients, partners and colleagues

Optimal 5
We have integrated to reach Zero
Trust and gained the full range of
benefits, in our products and services
and in seamless collaboration within
the firm and with partners

Your organisation’s journey to Zero Trust will be different, depending on your drivers,
the benefits you want to gain and your ambition to change

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Taking the first step


Adopting Zero Trust doesn’t mean starting afresh

While Zero Trust can help organisations achieve transformational business change, the adoption of a Zero Trust
framework does not necessarily entail a radical overhaul of your existing cyber capabilities. From our
experience, most organisations already have some of the key building blocks and fundamental capabilities
required to embark on a Zero Trust journey and realise some of the potential benefits.

Zero Trust environments are primarily built through the integration and evolution of existing cyber capabilities,
supplemented by the introduction of next generation technologies. With a clear line of sight to the benefits
that are being sought, organisations must set clear architectural principles and roadmaps, which provide a
common Zero Trust blueprint from which capabilities can be built around.

Zero Trust blueprints

Moving to Zero Trust doesn’t mean throwing everything out and starting again. Zero Trust
involves the evolution and integration of existing capabilities with next-generation technology

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

What benefits does Zero Trust unlock?


Unlocking benefits along the Zero Trust journey

Across the Zero Trust journey, capabilities can be built and integrated to ‘unlock’ a series of benefits – from
decreasing cyber risk and improving user experience to reducing IT costs and enabling better digital
collaboration. With clarity on your business priorities, and leveraging our Zero Trust framework tool, Deloitte
can support you in mapping the right path for your organisation, providing clear and measurable alignment to
defined business outcomes.

Example Zero Trust Roadmap

1 No significant benefits unlocked at the ‘Traditional’ (1) stage

2
Streamlined
authentication

Reduced blast
Modern SOC
radius

Low friction user


experience

Optimised WAN
connectivity
3

Improved partner
collaboration
Internet ready
applications

Industry 4.0
Passwordless user cyber ready
experience

Secure application Bring Your Modernised OT Automated cyber


access Own Device Security detection and
response

Network Adaptive cyber


agnostic security function
5

Key: Zero Trust Benefits


Enabling the Supporting digital Reducing and Sustainably Enhancing Critical benefit
modern workplace products & services managing risk reducing cost business agility unlocked

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Challenges in adopting Zero Trust


Exploring the common obstacles in implementing Zero Trust

While every organisations’ journey to Zero Trust will be different and shaped by their business priorities, there
are often a common set of obstacles and pitfalls that will need to be navigated – some of these include:

Embracing change Integrating legacy


Zero Trust must be supported by a dynamic Bespoke approaches are often required to
and adaptive cyber organisation, which enable legacy systems (IT & OT) to participate
embraces new ways of working in Zero Trust environments

Having end-to-end visibility Incomplete solution


Zero Trust requires end-to-end visibility of what There is no silver bullet for Zero Trust, with no
you have and how it is used in order to provide vendor providing an end-to-end
the basis for trust solution

Business collaboration Designing for adaptability


Close collaboration is required between Cyber Zero Trust is evolving rapidly. New capability
and the rest of the organisation to ensure arrives frequently – a Zero Trust programme
clarity of purpose and alignment must be agile to keep pace

Making it all work together Taking the first step


The lack of common Zero Trust standards leads Establishing the right governance and
to integration challenges between understanding where to start is fundamental
solutions to success

Any Zero Trust journey will be faced with pitfalls and obstacles that will require support,
investment and buy-in from across your organisation to successfully navigate

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Case studies
How Deloitte is supporting organisations on their Zero Trust journeys

Transport and Logistics Company


Main drivers: Closer relationship with customer and digitalisation of value chain

Situation:
A global transport and logistics company is on a transformational journey to become the global leader in the industry. As
part of this transformation, the organisation are modernising their legacy application portfolio and seeking to open it up
to trading partners.

Action:
Deloitte is leading the delivery of this transformational programme. We’re currently working hand-in-hand with the
client to modernise legacy applications, implement new SaaS applications and perform the various integrations.
Applications are being deployed on an API-centric, zero-trust, cloud-native architecture, which means that employees,
trading partners and application APIs are able to securely connect and communicate via the public internet, without the
need for VPNs or private connections.

Industrial Conglomerate
Main drivers: Digital transformation, secure and protect customer critical IT and OT assets

Situation:
An Industrial Conglomerate needed support in getting executive level buy-in and funding for a Zero Trust programme.

Action:
Deloitte worked closely with the client to understand their ambitions and drivers, and develop a compelling business
case and vision for Zero Trust that was anchored to the business’ strategic priorities. Deloitte also developed a capability
assessment model to assist the client with making the right decisions along their journey and provided a roadmap with
prioritised initiatives to meet the benefits being sought by the programme.

Global Aircraft Engine Manufacturer


Main drivers: Easier M&A integration and ability to collaborate with third parties

Situation:
A global aircraft engine manufacturer needed to create a new technology environment to accommodate a newly
acquired business. This challenge was compounded by requirements of flexibility and high availability.

Action:
Deloitte was responsible for delivering an end-to-end Zero Trust solution, from defining programme requirements and
building the conceptual architecture, through to the implementation. This highly-scalable Zero Trust solution enabled
frictionless collaboration with third parties, whilst achieving high availability and resilience requirements for this essential
business function.

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Why Deloitte?
Our experience and what sets us apart

Breadth of our offering


We see the Zero Trust big picture and understand the scale of change required – from networks and
identity, to changing the organisation itself to work in a more adaptive way. We understand the ‘why’
of Zero Trust as well as the ‘how’.

Depth of our experience


We have in-depth experience in delivering and implementing the programme of change,
with specialist skills across all nine domains of Zero Trust.

Technology independence
Our independence ensures our credibility as a trusted advisor and enables us to
provide clients with unbiased advice on the pitfalls and challenges in implementing
Zero Trust, while still allowing us to bring the right technical skills to the table.

Deloitte’s Zero Trust framework


Our assessment and planning tool supports clients in choosing their Zero Trust journey,
helping them to make the right decisions along the way and flex the programme to
accommodate any changes during delivery.

Passionate Partnership
We are passionate about partnering with clients on Zero Trust to work together to build innovative
solutions and tackle the big challenges head on.

© 2021. For information contact Deloitte LLP


Zero Trust | Revolutionary approach to Cyber or just another buzz word?

Contact us

Wil Rockall Matt Holt


wrockall@deloitte.co.uk maholt@deloitte.it

Fadi Mutlak Serdar Cabuk


fmutlak@deloitte.com scabuk@deloitte.dk

Karthi Pillay Richard Price


karthi.pillay@deloitte.fi richardprice@deloitte.co.uk

Luís Abreu Marius von Spreti


labreu@deloitte.pt mvonspreti@deloitte.de

© 2021. For information contact Deloitte LLP 15


Zero Trust | Revolutionary approach to cyber or just another buzz word?

This publication has been written in general terms and we recommend that you obtain
professional advice before acting or refraining from action on any of the contents of this
publication. Deloitte LLP accepts no liability for any loss occasioned to any person acting or
refraining from action as a result of any material in this publication.
Deloitte LLP is a limited liability partnership registered in England and Wales with
registered number OC303675 and its registered office at 1 New Street Square, London
EC4A 3HQ, United Kingdom.
Deloitte LLP is the United Kingdom affiliate of Deloitte NSE LLP, a member firm of Deloitte
Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”). DTTL and
each of its member firms are legally separate and independent entities. DTTL and Deloitte
NSE LLP do not provide services to clients. Please see www.deloitte.com/about to learn
more about our global network of member firms.
© 2021 Deloitte LLP. All rights reserved.

© 2020. For information contact Deloitte LLP 16

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy