Zero Trust Metrics Track Progress and Program Maturity
Zero Trust Metrics Track Progress and Program Maturity
Measurement Approaches
Approach A: Maturity Models
Approach B: Risk-Based Progress
Approach C: Ongoing Metrics
Next Steps
6
© 2023 IANS Research. All rights reserved.
When to Consider Measurements
We cover 3 approaches to measurements, some of which could be identified early
in a Zero Trust strategy planning process. Other measurements arise as the
projects are in initiated, and a final set will be relevant as an ongoing pulse of the
organization’s ability to execute its Zero Trust plans.
The 3 approaches are:
• Approach A: Maturity Models
• Approach B: Milestone Progress Tracking
• Approach C: Ongoing Metrics
When to Consider Measurements
Everyone Uses Approach C:
Ongoing Metrics should be
constantly evaluated
Prioritizing
Identifying Primary Projects Based on
Objectives for Zero Pillar, Protect Measuring and Tracking
Trust Surface, or B.U. Progress
2 4 6
1 3 5
Initial Information Allocating Budget and Initiating Zero Trust
Gathering and Building Determining Operational Projects
Internal Team(s) Plans
q Small-Medium Business
q Government
q Education or Not-for-Profit
©10
2023 IANS Research. All rights reserved.
Measurement Approaches
{ OR } { AND }
Formal program roadmap Ad-hoc risk-based approach Ongoing data for decision-making
Approach 1: Maturity Models
A look at what’s beyond CISA for non-federal entities
Maturity Models
WHAT IT IS
Maturity Models (MM) are the way to go for enterprises with a mature
cybersecurity program and teams.
WHAT TO USE
U.S. federal agencies rely on CISA’s model. There’s lag in others but look for
vendor-specific (e.g., Microsoft), and vendor-neutral (e.g., CSA).
HOW TO USE
Select or create a Maturity Model and track capabilities for relevant protect
surfaces and/or pillars (described soon).
Automated dynamic granular access control
Optimized
Network segmentation defined with large Some network architecture defined by Architecture is fully distributed
Network Network Segmentation perimeters/macro-segmentation (VLANs, ingress/egress microperimeter with some ingress/egress microperimeters
subnets, VRFs). microsegmentation. including application workflows.
.
access based on posture.
limited conditional access dynamically based
deployment segmentation definedpolicies
for
Network with large e.g.,
Somebased on conditional
network architecture defined by Architecture is fully distributed
Network Network Segmentation perimeters/macro-segmentation on(VLANs,
user, role,
ingress/egress microperimeter withaccess
some policies
ingress/egress microperimeters
specific sensitive subnets, VRFs). microsegmentation. including application workflows.
device, geography, with the addition of
data/assets, and data dynamic posture of
applied Some critical cloud apps areclassification
directly
All cloud apps and some
the to
on-prem apps are directly accessible user, device,
All applications are directly
Application
inconsistentlyothers
Accessibility
if accessible via VPN.
accessible to users over the internet; all
users over
target, data,
accessible to users
etc.
over the internet.
the internet; others accessible via VPN.
at all which may be
Data is stored primarily on prem and is triggered in-
Data is stored in cloud and remote
Data Encryption environments where they are encrypted atAll data at rest is encrypted.
unencrypted at rest.
rest. session
Perfect for small to midsize organizations who don’t currently have the teams
or formalized processes required for a Maturity Model, and/or who lack a
formalized Zero Trust strategy and are starting with point projects.
WHAT TO USE
Scenarios Model Encrypted Inspected Brokered ZTNA Least Privilege MFA Endpoint or
Net Posture
User “Joe” accessing SaaS Yes No No N/A Yes by CRM policy or Yes No
CRM AD group
Total
score
Planned or In Progress
Remaining
Risk Value
17 Current
Value
Specific metrics, both strategic and functional, that should be measured and
reported on for decision-making support and trending analysis.
WHEN TO USE
Organizations of all sizes and capabilities should use Ongoing Metrics. It’s
okay to start with what’s available and expand later.
WHAT TO USE
We’ll provide a starter list along with prompts to keep you going.
HOW TO USE
Metrics should inform decisions and should align activities and effort with the
overall business objectives. Metrics include strategic and functional as well
as current, past/lagging, and future predictive data.
Metrics To Consider Metrics To Avoid
• Trending analysis such as reduction of help • Avoid raw data metrics with no context or
desk tickets and password resets, in context ratio, such as # of logon failures, # of alerts,
of total scoped user population. etc.
• Comparison of tracked security • Avoid using percent complete metrics
events/alerts for comparable controls before without a weighted impact scale such as %
and after (with the understanding zero trust of endpoints with XYZ agent installed with no
solutions may offer more visibility and skew context.
numbers). • Avoid tracking toward an unnecessary
• Focus on percent complete metrics in objective, such as always seeking
limited scope, such as % of privileged Optimized (top maturity) in every pillar; goals
users/accounts with MFA (vs. % of total will vary by organization.
population).
Decision Inputs
Such as hiring, firing, budget allocation, prioritization of
projects
©28
2023 IANS Research. All rights reserved.
Aligning Measurements to the Business
• Earn and preserve customer trust
• Earn and preserve employee trust
• Protect brand reputation
Business • Retain relevancy in the market
Objectives •…
©31
2023 IANS Research. All rights reserved.
Next Steps
1. Identify where you are the Zero Trust journey.
2. Identify where you are in capabilities for measurements; can/do you have a
Maturity Model to formalize, do you need to create Milestone Tracking?
3. Evaluate possible Metrics several ways:
• Review controls/MM or objectives and do a blue-sky exercise to work
out what data delivers the information you need.
• Look at what data you have and see if there’s meaningful ways to use it.
• Revisit decisions that have been made in the past and determine what
data would have been helpful in decision support at that time.
• Look forward at decisions to be made and determine what data is most
helpful.
Thank you!
Questions?
Recognize and honor the best
cybersecurity professionals
in the world
Over 12 awards categories available to
address any stage of one’s career from
Rising Star to Senior Professional
Nominate today!
https://isc2-awards.secure-platform.com/site
Thank you for attending this webinar!
Please visit the
“Attachments” tab.
There you’ll find supporting
assets and speaker’s LinkedIn
information.
Please take a moment to leave your feedback &
comments in the “Rate This” tab
Stay Connected!
Update your email preferences to receive
news about upcoming (ISC)² webinars,
publications & more!
Current Members:
https://www.isc2.org/Dashboard/Preferences
Non-members:
www.isc2.org/preferences
New to (ISC)²:
https://www.isc2.org/connect
We apologize,
We are currently experiencing
technical difficulties.