flex-height
text-black

What is zero trust?

Zero trust is an IT security model that requires every user and potentially connected device to strictly verify their identity whether they are inside or outside the company’s perimeters.

default

{}

default

{}

primary

default

{}

secondary

The guiding zero trust principle—“never trust, always verify”—has become an essential practice for securing today’s complex and diverse cloud networks. Not so long ago, you could lock your company’s front door, confident that all your valuable information was secure within those walls. Then along came laptops and disks and memory sticks—and every so often you’d hear a story about someone leaving state secrets on a train somewhere. Today, your company’s data is available potentially anywhere there’s connectivity. And with the unprecedented rise in remote and distributed workforces, that “anywhere” can literally be “anywhere on the globe.”

These days, the best software solutions all run in the cloud—to say nothing of the millions of connected devices and assets in the world’s industrial IoT networks. And while cloud applications are not typically less secure than on-premise ones—quite the opposite, in fact—there are new risks in today’s connected world. Digital and cloud technologies have widened what security experts call the attack surface of every organisation.

Traditional cybersecurity protocols were modelled on the idea of users going through security at the company’s virtual front door and then having the run of the place once they got inside. In other words, they were developed in a pre-cloud world. But now there are more access points—an employee’s personal phone or an IoT printer could be a potential portal—and companies have had to tighten their security strategies. With cyberattacks at a record high, network security should be in a priority position at the top of your to-do list. Zero trust implementation requires commitment and collaboration across your entire organisation.

Zero trust: Definition and strategy

John Kindervag was working as an analyst at Forrester Research in 2010—at a time when cloud applications and IoT devices were beginning their rapid rise. Kindervag rightly recognised the enormous sensitivity and value of the data and intellectual property held within Forrester’s systems. In response to this growing risk, he coined the term zero trust and led the development of many of its core principles.

Zero trust can be defined as an IT security model that requires every user and potentially connected device to strictly verify their identity whether they are inside or outside the company’s perimeters. Zero trust architecture (ZTA) relies upon a set of processes and protocols as well as dedicated digital solutions and tools to achieve success.

Zero trust network access (ZTNA) is the application of zero trust architecture which Gartner defines as the creation of “an identity- and context-based, logical access boundary around an application or set of applications.” This removes these applications from public view and allows in only those users who are verified and who adhere to pre-specified access policies.

But in reality, zero trust begins as a cultural transformation within your organisation. We tend to think of cybersecurity in terms of bad actors who strive intentionally to cause harm, but unfortunately, it’s often ignorance rather than malevolence that leads to risk and loss. In fact, a recent report shows a 48% increase in email attacks in just the first half of 2022, in which employees were lured into scams or divulged details as a result of phishing. This illustrates why education and cultural buy-in is such a critical component of zero trust implementation.

Why are zero trust principles so necessary right now?

There’s little doubt that cyber attacks are on the rise. In 2022, a major survey was conducted involving 1,200 large organisations across 14 different sectors and 16 countries. Despite prioritising cybersecurity, many of the respondents admitted to having inadequate security. In fact, the findings showed an alarming 20.5% rise in the number of material breaches in the months between 2020 and 2021.

The following are some of the other security challenges that today’s businesses encounter:

Person scrolling through data on mobile device

How does zero trust work?

Zero trust combines a set of technologies and protocols such as multi-factor authentication, endpoint security solutions, and cloud-based tools to monitor and verify a variety of attributes and identities—from users to endpoints. Zero trust also requires the encryption of data, emails, and workloads to ensure their security. Essentially, zero trust protocols:

A zero trust security model uses a need-to-know policy. Essentially, this means that users only have access to the data and applications they need to do their jobs. And once again, technology is the double-edged sword in the race for better cyber security. As digital solutions and connectivity improve, they create a larger attack surface, so better and faster security technologies are required to keep up. And not just keep up but also cause minimal inconvenience and disruption for the user. This requires highly agile and dynamic security policies, supported by contextual information and the maximum amount of data points available—and in real time. Who is this person? Where are they? What are they trying to access? Why do they need that access? Which device or endpoint are they coming in on?

Benefits of zero trust solutions

At their most serious, data breaches can be catastrophic. Your customers’ private data is at risk as are your finances, your intellectual property, and of course, your good reputation. Like insurance, security investments can seem like a big expense… until you need them. And then they seem like a small price to pay to protect your business.

Some of the many benefits of zero trust solutions include:

Zero trust best practices: Getting started

There are several tasks that you will need to undertake once your zero trust transformation has begun. This includes cataloguing your assets, defining segments within your organisation, and classifying your data for a smoother transition.

Zero trust begins with a commitment and the following steps can help you get started:

In today’s world of euphemisms and careful language, zero trust may seem to your employees like a somewhat cynical term. So, get ahead of that when you introduce zero trust to your teams. Tell them at the outset that this in no way means you don’t trust them. It’s the cybercriminals that no one should trust—because they can make things seem like something they’re not. They can sneak in through the tiniest gaps and once they’re inside, they don’t care whom they damage.

Zero trust and SAP

Secure your business with support from an innovative and dependable partner.

Visit the SAP Trust Centre

Zero trust and SAP

Secure your business with support from an innovative and dependable partner.

Visit the SAP Trust Centre