Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Principles v1.1
2
Zero Trust Background and Drivers
3
Zero Trust Implementation Methodology
For more detailed information on the 5 step process reference the CSA ZT Implementation Primer: The 5 Step Process and the NSTAC Report to the
President on Zero Trust and Trusted Identity Management.
4
Zero Trust Guiding Principles
5
Begin with the End in Mind
(Business/Mission Objectives)
Having a clear vision of your desired direction and destination fosters alignment between the business
strategy, the operational model, and the security architecture. Desired outcomes include:
6
Do Not Overcomplicate
Zero Trust is a collection of long-standing principles applied in a way that aligns the security architecture with the way we work and live. Zero Trust builds
on core principles by making controls more granular and more sensitive
7
Products Are Not the Priority
Zero Trust recognizes the holistic relationship between people, processes, organizations, and technology
PEOPLE ORGANIZATION
Zero Trust
8
Access Is a Deliberate Act
9
Inside Out, not Outside In
Move from “What are we trying to defend against?” to “What are we trying to protect?”
Once you know the assets to be protected and their relationships, you can identify both the protect and attack surfaces.
Kipling Method:
What we are trying to protect:
10
Breaches Happen
The ability to more effectively correlate identity, actions, and assets greatly enhances Data Loss Prevention (DLP)
efforts. AI, combined with UEBA, can be used to automate the process of correlating identity, action, and asset
data to detect and respond to anomalous activity and make contextual DLP decisions
11
Understand Your Risk Appetite
All organizations need to determine their risk appetite. That determination goes far beyond just their Zero Trust
journey.
As part of that journey, it is well advised to understand what has been agreed upon, the role of Zero Trust, and the
tools regularly used by the organization.
Risk Appetite is the level of risk an organization is willing to accept while pursuing its objectives.
Inherent Risk is the level of risk that exists before actions (e.g., treatments) are taken.
The objective is to treat the risk to reduce it to a level below the Risk Appetite.
This is called Acceptable Risk.
12
Ensure the Tone from the Top
Zero Trust is an organizational effort that requires cooperation throughout all levels of the organization to be successful. This can only be
achieved with the proper executive sponsor and clear messaging from the top.
Leaders should set the tone by fully supporting the Zero Trust model and emphasizing its
importance to the organization. This should be actively communicated and include alignment with
business strategy, proper capital allocation, and corporate policies.
13
Instill a Zero Trust Culture
“Culture is what people do when no one is looking.” - Herb Keller
14
Start Small and Focus on Quick Wins
Obtaining and maintaining buy-in from leadership is easier when a small, low-cost protect surface is selected as a pilot so its metrics can be leveraged to
highlight the change to the security paradigm and demonstrate business value
15
Continuously Monitor
Monitoring and maintaining a Zero Trust infrastructure involves regular auditing of access privileges, continuous monitoring of network behavior,
maintaining up to date security patches, conducting risk assessments, and reinforcing user security awareness.
● Knowing that bad actors often compromise the accounts of valid users, and
malevolent insiders often attempt to exceed privileges to suit their needs, it is
important to monitor and log events
● Monitoring is essential to detect potential bad acts early
● Logging is essential for identifying indicators of compromise (IOC), determining
impact, and collecting evidence
● Both monitoring and logging foster continuous improvement
16
Conclusion
17
References and Suggested Reading
● Zero Trust Advancement Center Resource Hub hosted by the Cloud Security Alliance,
https://cloudsecurityalliance.org/zt/resources/
● US Federal Zero Trust Resource Hub. https://zerotrust.cyber.gov/
● National Security Telecommunications Advisory Committee (NSTAC), Report to the President on Zero Trust and Trusted
Identity Management, 2022
● https://www.cisa.gov/sites/default/files/publications/NSTAC%20Report%20to%20the%20President%20on%20Zero%20T
rust%20and%20Trusted%20Identity%20Management%20%2810-17-22%29.pdf
● Zero Trust Maturity Model Version 2, Cybersecurity and Infrastructure Security Agency (CISA), April 2023
● https://www.cisa.gov/zero-trust-maturity-model
● Executive Order on Improving the Nation’s Cybersecurity, The White House, May 12, 2021,
https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-
cybersecurity/
● Press Release for NSA Guidance on Advancing Zero Trust Maturity Throughout the User Pillar, US National Security Agency
(NSA), 2023
● https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3328152/nsa-releases-recom
mendations-for-maturing-identity-credential-and-access-manage/
● Advancing Zero Trust Maturity Throughout the User Pillar, National Security Agency (NSA), March 2023
● https://media.defense.gov/2023/Mar/14/2003178390/-1/-1/0/CSI_Zero_Trust_User_Pillar_v1.1.PDF
● Zero Trust Architecture, National Institute of Standards and Technology (NIST), Special Publication 800-207, 2020
● https://csrc.nist.gov/publications/detail/sp/800-207/final
18
Acknowledgements
Reviewers
Lead Author
Sam Aiello Michael Roza
Contributors Alex Sharpe
Jason Garbis Vaibhav Malik
Brett James Meghana Parwate
Robin Basham Rajesh Murthy Yves Le Gelard Sven Olensky
Madhav Chablani Denis Nwanshi
Frank DePaola Lars Ruddigkeit
Jennifer Minella Annabelle Lee
Jonathan Flack Paul Simmonds Aaron Robel Himanshu Sharma
Sai Honig Nelson Spessard
Chandrasekaran Rajagopalan
Shamik Kacker Bernd Wegmann
Andrea Knoblauch Heverin Joy Williams
Alice Muravin Lauren Wise
CSA Analyst
Erik Johnson
19