Deloitte Cyber Zero Trust
Deloitte Cyber Zero Trust
2021
Zero Trust | Revolutionary approach to Cyber or just another buzz word?
In recent years, Zero Trust has become somewhat of a buzz word within industry circles, with lots of attention
placed on how this innovative approach to cyber security can help organisations to defend against the new
generation of attackers – who are better networked, more organised and who have access to tools that only a
few years ago were the preserve of nation state actors.
However, there are a broader set of business drivers and demands, which are pushing Zero Trust onto the
corporate agenda and highlight the need for greater speed and adaptability in how organisations approach
cyber security, as they seek to survive and thrive in an increasingly digital world.
The development of digital products and The shift to the Cloud is demanding a new
services is being constrained by rigid approach to securing critical business
cyber security controls data
An increasingly mobile workforce now The demand for better and easier
expect to be able to work from anywhere, business collaboration requires a more
on any device agile approach to security
Understanding your drivers to embarking on a Zero Trust journey will help shape the
path you take
Zero Trust is a framework for looking at Cyber Security in a new way. Based on the fundamental principle of
“never trust, always verify”, Zero Trust moves away from the traditional perimeter-based concept of managing
security, to one where trust is established between individual resources and consumers, as and when needed.
Trust is determined based on a combination of internal and external factors and is constantly revalidated.
Zero Trust releases the shackles from IT, enabling businesses to strip away cumbersome and expensive security
controls, and build a more dynamic, efficient and customer-orientated technology platform.
…Transformative. Re-imagining
how you manage cyber and
unleashing it, to better align to
the way you do business
Zero Trust is a new way of thinking about security based on the principles of “never trust,
always verify” – aligning the way you do security to the way you do business
Key Concepts
How does it work?
Supportive Mechanisms
Behaviour
analysis Security
Policies
logs
Identity
Threat
(Directory,
Intelligence
IDP)
Policy Engine
Continuous Historical
monitoring Data
Establishing Establishing
Trust Trust
X
Data
IT/OT/IoT ✓
? Devices
Devices Policy Enforcement OT/IoT
All communications, regardless of location, are treated from the same starting point of
having no inherent trust. Trust is established by a dynamic policy, informed by a range of
signals – from behavioural analytics to threat intelligence - and is constantly revalidated
There is a lot of excitement around Zero Trust with big claims made by vendors about the benefits that it can
bring – but should we believe the hype? While it is certainly not a silver bullet, Zero Trust can unlock a range of
opportunities for organisations by better aligning security to how they do business, reducing risk, improving
agility and driving down operating costs – however these benefits are hard won and require support and
commitment from across the organisation to truly be realised.
While Zero Trust can help unlock a range of benefits, to truly realise its potential you
need to approach it methodically, with a clear line of sight to how Zero Trust will deliver
these benefits for your organisation
Deloitte’s Zero Trust functional architecture is aligned to NIST’s Zero Trust Architecture standards (SP 800-207)
and is designed to provide an end-to-end view of the key components and how they interact in a Zero Trust
environment.
Adaptive Cyber
(Organisational Design and Change, Cybersecurity Training and Awareness)
Identity Information
Identity (User, Device and Application, IDP) Identity
Identity-based Historic
policies Information
Session Continuous
policies Monitoring
Workloads Workloads
Enterprise policies Contextual Data
(Non-exhaustive) (Non exhaustive)
Policy Administrator
X X
Devices Data
Operations
(Detection and Response, Security and Event Monitoring, Security Orchestration)
Deloitte’s Zero Trust functional architecture helps provide a target state for the end-to-
end Zero Trust vision
The adoption of Zero Trust should be viewed as an organisation-wide journey, that is as much about
repositioning how we approach and manage cyber risk across the organisation as it is about evolving
technology capabilities. At Deloitte, we use a framework which encompasses nine foundational domains which
help to shape the Zero Trust journey and deliver desired business outcomes
Network
Private networks retired and use of public
From: private network with To: use of public networks with
networks and micro-perimeter based legacy
enterprise-wide perimeter resource/services perimeter
services*
Identity
To: consolidated identity stores
Consolidated identity technologies and From: disparate identity stores and
(e.g., Identity providers and Trust-
processes to enable adaptive access pre-defined static access
based access)
Operations
From: reactive, pre-defined metric
Predictive and preventative security tooling and To: predictive, monitoring and
measurement and manual
automated processes automated response
response
Devices
Real-time assessed device trust level based on From: pre-defined or accepted To: dynamically assessed device
device health and additional criteria device trust level trust based on multiple criteria
Workloads
Context-aware access using defined trust levels From: static predetermined access To: dynamic access based on health
to applications, secured with micro-perimeters and an inherited trust model and other criteria
Data
Trust levels based on enterprise-wide From: varied data type and To: enterprise-wide classification
classification of data sensitivity classification of data-based value and sensitivity
Adaptive Cyber
From: static cyber organisation, To: shared accountability for cyber
Dynamic security organisation closely aligned to
disconnected from the business, and continuous collaboration
business priorities and continuously adapting to
without clear ownership of cyber amongst teams to deliver business
the internal/external environments
risk goals
Zero Trust programmes involve much more than just technology and require the
integration of a broad set of capabilities to realise its full potential
© 2021. For information contact Deloitte LLP * Click here to read Deloitte's point of view on the evolution of 'Enterprise Network Security Architecture'
Zero Trust | Revolutionary approach to Cyber or just another buzz word?
The journey to Zero Trust is different for every organisation and will be shaped by your business priorities, the
benefits you are seeking and your ambition to change. This is what that journey may feel like:
Traditional 1
We have built components of Zero
Trust but didn’t know it. We are
lagging behind the competition,
with a flat, expensive and complex
network that is frustrating to
navigate and manage
2 Foundations
We are seeing early improvements
to key tools and technologies. We
understand where we are going and
how we are going to get there
Essentials 3
It's easier to get things done. New
staff and partners are quickly on-
boarded. Workplace feels more
modern and new tools are available
4 Advanced
We are working as a truly cloud-first
company, collaborating and co-
creating seamlessly and securely
with clients, partners and colleagues
Optimal 5
We have integrated to reach Zero
Trust and gained the full range of
benefits, in our products and services
and in seamless collaboration within
the firm and with partners
Your organisation’s journey to Zero Trust will be different, depending on your drivers,
the benefits you want to gain and your ambition to change
While Zero Trust can help organisations achieve transformational business change, the adoption of a Zero Trust
framework does not necessarily entail a radical overhaul of your existing cyber capabilities. From our
experience, most organisations already have some of the key building blocks and fundamental capabilities
required to embark on a Zero Trust journey and realise some of the potential benefits.
Zero Trust environments are primarily built through the integration and evolution of existing cyber capabilities,
supplemented by the introduction of next generation technologies. With a clear line of sight to the benefits
that are being sought, organisations must set clear architectural principles and roadmaps, which provide a
common Zero Trust blueprint from which capabilities can be built around.
Moving to Zero Trust doesn’t mean throwing everything out and starting again. Zero Trust
involves the evolution and integration of existing capabilities with next-generation technology
Across the Zero Trust journey, capabilities can be built and integrated to ‘unlock’ a series of benefits – from
decreasing cyber risk and improving user experience to reducing IT costs and enabling better digital
collaboration. With clarity on your business priorities, and leveraging our Zero Trust framework tool, Deloitte
can support you in mapping the right path for your organisation, providing clear and measurable alignment to
defined business outcomes.
2
Streamlined
authentication
Reduced blast
Modern SOC
radius
Optimised WAN
connectivity
3
Improved partner
collaboration
Internet ready
applications
Industry 4.0
Passwordless user cyber ready
experience
While every organisations’ journey to Zero Trust will be different and shaped by their business priorities, there
are often a common set of obstacles and pitfalls that will need to be navigated – some of these include:
Any Zero Trust journey will be faced with pitfalls and obstacles that will require support,
investment and buy-in from across your organisation to successfully navigate
Case studies
How Deloitte is supporting organisations on their Zero Trust journeys
Situation:
A global transport and logistics company is on a transformational journey to become the global leader in the industry. As
part of this transformation, the organisation are modernising their legacy application portfolio and seeking to open it up
to trading partners.
Action:
Deloitte is leading the delivery of this transformational programme. We’re currently working hand-in-hand with the
client to modernise legacy applications, implement new SaaS applications and perform the various integrations.
Applications are being deployed on an API-centric, zero-trust, cloud-native architecture, which means that employees,
trading partners and application APIs are able to securely connect and communicate via the public internet, without the
need for VPNs or private connections.
Industrial Conglomerate
Main drivers: Digital transformation, secure and protect customer critical IT and OT assets
Situation:
An Industrial Conglomerate needed support in getting executive level buy-in and funding for a Zero Trust programme.
Action:
Deloitte worked closely with the client to understand their ambitions and drivers, and develop a compelling business
case and vision for Zero Trust that was anchored to the business’ strategic priorities. Deloitte also developed a capability
assessment model to assist the client with making the right decisions along their journey and provided a roadmap with
prioritised initiatives to meet the benefits being sought by the programme.
Situation:
A global aircraft engine manufacturer needed to create a new technology environment to accommodate a newly
acquired business. This challenge was compounded by requirements of flexibility and high availability.
Action:
Deloitte was responsible for delivering an end-to-end Zero Trust solution, from defining programme requirements and
building the conceptual architecture, through to the implementation. This highly-scalable Zero Trust solution enabled
frictionless collaboration with third parties, whilst achieving high availability and resilience requirements for this essential
business function.
Why Deloitte?
Our experience and what sets us apart
Technology independence
Our independence ensures our credibility as a trusted advisor and enables us to
provide clients with unbiased advice on the pitfalls and challenges in implementing
Zero Trust, while still allowing us to bring the right technical skills to the table.
Passionate Partnership
We are passionate about partnering with clients on Zero Trust to work together to build innovative
solutions and tackle the big challenges head on.
Contact us
This publication has been written in general terms and we recommend that you obtain
professional advice before acting or refraining from action on any of the contents of this
publication. Deloitte LLP accepts no liability for any loss occasioned to any person acting or
refraining from action as a result of any material in this publication.
Deloitte LLP is a limited liability partnership registered in England and Wales with
registered number OC303675 and its registered office at 1 New Street Square, London
EC4A 3HQ, United Kingdom.
Deloitte LLP is the United Kingdom affiliate of Deloitte NSE LLP, a member firm of Deloitte
Touche Tohmatsu Limited, a UK private company limited by guarantee (“DTTL”). DTTL and
each of its member firms are legally separate and independent entities. DTTL and Deloitte
NSE LLP do not provide services to clients. Please see www.deloitte.com/about to learn
more about our global network of member firms.
© 2021 Deloitte LLP. All rights reserved.