What Are Practical Projects For Implementing Zero Trust
What Are Practical Projects For Implementing Zero Trust
Vendor marketing abuses the overloaded term “zero trust” to imply improved security. Security
and risk management leaders must move beyond the hype and implement two key projects to
reduce risk with least privileged access and adaptive security.
Quick Answer
What are practical projects for implementing zero trust?
■ The majority of organizations interested in zero trust are in the planning or strategy phase.
More Detail
Gartner observes, based on client inquiry, that most organizations are in the strategy phase for
zero trust. However, “zero trust” is an overloaded term used by vendor marketing as a shorthand
for “new and improved” security. Zero trust is seen by many security leaders as a silver bullet, but
it does not cover all aspects of threats and security, such as phishing and sensitive data
protection. A complete zero trust security posture may never be fully achieved, due to limitations
such as legacy applications, organizational resistance, complexity of managing granular security
controls and other factors.
However, the term “zero trust” has value as a shorthand way of describing a paradigm where
implicit trust is removed from all of our computing infrastructure. Implicit trust is replaced with
explicitly calculated, real-time adaptive trust levels for just in time, just enough access to
enterprise resources.
https://www.gartner.com/doc/reprints?id=1-273JRYQI&ct=210804&st=sb%E2%80%A9 1/5
22/07/2022, 17:40 Gartner Reprint
There are two primary projects that organizations should focus on when looking to implement
zero trust (see Figure 1).
Most zero trust strategies start with networking-related initiatives due to the excessive implicit
trust in traditional network security models. Zero trust networking initiatives break into two areas:
■ Identify the source of truth for user identities, including the process for third-party identities.
■ Define polices where stronger authentication is required (MFA, CAC card, PIN, etc.).
■ For workloads, define how machine and application identities are established.
■ Architect for managing machine identities at scale for container and Kubernetes environments.
https://www.gartner.com/doc/reprints?id=1-273JRYQI&ct=210804&st=sb%E2%80%A9 2/5
22/07/2022, 17:40 Gartner Reprint
■ Require stronger authentication for all remote access and SaaS application access.
■ Make context-based access mandatory for all SaaS applications (e.g., cloud SSO or CASB).
■ Integrate with the federated identity systems to control access on-premises and in the cloud.
After a solid foundation is in place, focus on these projects and critical questions:
■ Inventory all instances of VPN that allow access to the network. Replace these over time.
■ Identify applications and servers in the DMZ with named sets of users. Replace these over time.
■ Define policies for combining user attributes and services to enforce who has access to what.
https://www.gartner.com/doc/reprints?id=1-273JRYQI&ct=210804&st=sb%E2%80%A9 3/5
22/07/2022, 17:40 Gartner Reprint
■ Identify workloads that require segmentation using means other than agents, such as network-
based or API-based orchestration.
Quick Answer: Cost Effectively Scaling Secure Access While Preparing for a Remote Workforce
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc.
and its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior
written permission. It consists of the opinions of Gartner's research organization, which should not be construed
as statements of fact. While the information contained in this publication has been obtained from sources
believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such
information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or
investment advice and its research should not be construed or used as such. Your access and use of this
publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and
objectivity. Its research is produced independently by its research organization without input or influence from
any third party. For further information, see "Guiding Principles on Independence and Objectivity."
https://www.gartner.com/doc/reprints?id=1-273JRYQI&ct=210804&st=sb%E2%80%A9 4/5
22/07/2022, 17:40 Gartner Reprint
About Careers Newsroom Policies Site Index IT Glossary Gartner Blog Network Contact Send
Feedback
https://www.gartner.com/doc/reprints?id=1-273JRYQI&ct=210804&st=sb%E2%80%A9 5/5