flex-height
text-black

What is zero trust?

Zero trust is an IT security model that requires every user and potentially connected device to strictly verify their identity whether they are inside or outside the company’s perimeters.

The guiding zero trust principle—“never trust, always verify”—has become an essential practice for securing today’s complex and diverse cloud networks. Not so long ago, you could lock your company’s front door, confident that all your valuable information was secure within those walls. Then along came laptops and disks and memory sticks—and every so often you’d hear a story about someone leaving state secrets on a train somewhere. Today, your company’s data is available potentially anywhere there’s connectivity. And with the unprecedented rise in remote and distributed workforces, that “anywhere” can literally be “anywhere on the globe.”

These days, the best software solutions all run in the cloud—to say nothing of the millions of connected devices and assets in the world’s industrial IoT networks. And while cloud applications are not typically less secure than on-premise ones—quite the opposite, in fact—there are new risks in today’s connected world. Digital and cloud technologies have widened what security experts call the attack surface of every organization.

Traditional cybersecurity protocols were modeled on the idea of users going through security at the company’s virtual front door and then having the run of the place once they got inside. In other words, they were developed in a pre-cloud world. But now there are more access points—an employee’s personal phone or an IoT printer could be a potential portal—and companies have had to crack down on their security strategies. With cyberattacks at a record high, network security should be in a priority position at the top of your to-do list. Zero trust implementation requires commitment and collaboration across your entire business.

Zero trust: Definition and strategy

John Kindervag was working as an analyst at Forrester Research in 2010—at a time when cloud applications and IoT devices were beginning their rapid rise. Kindervag rightly recognized the enormous sensitivity and value of the data and intellectual property held within Forrester’s systems. In response to this growing risk, he coined the term zero trust and led the development of many of its core principles.

Zero trust can be defined as an IT security model that requires every user and potentially connected device to strictly verify their identity whether they are inside or outside the company’s perimeters. Zero trust architecture (ZTA) relies upon a set of processes and protocols as well as dedicated digital solutions and tools to achieve success.

Zero trust network access (ZTNA) is the application of zero trust architecture which Gartner defines as the creation of “an identity- and context-based, logical access boundary around an application or set of applications.” This removes these applications from public view and allows in only those users who are verified and who adhere to pre-specified access policies.

But in reality, zero trust begins as a cultural transformation within your organization. We tend to think of cybersecurity in terms of bad actors who strive intentionally to cause harm, but unfortunately, it’s often ignorance rather than malevolence that leads to risk and loss. In fact, a recent report shows a 48% increase in email attacks in just the first half of 2022, in which employees were lured into scams or divulged details as a result of phishing. This illustrates why education and cultural buy-in is such a critical component of zero trust implementation.

Why are zero trust principles so necessary right now?

There’s little doubt that cyberattacks are on the rise. In 2022, a major survey was conducted involving 1,200 large organizations across 14 different sectors and 16 countries. Despite prioritizing cybersecurity, many of the respondents admitted to having inadequate security. In fact, the findings showed an alarming 20.5% rise in the number of material breaches in the months between 2020 and 2021.

The following are some of the other security challenges that today’s businesses face:

Person scrolling through data on mobile device

How does zero trust work?

Zero trust combines a set of technologies and protocols such as multi-factor authentication, endpoint security solutions, and cloud-based tools to monitor and verify a variety of attributes and identities—from users to endpoints. Zero trust also requires the encryption of data, emails, and workloads to ensure their security. Essentially, zero trust protocols:

A zero trust security model uses a need-to-know policy. Essentially, this means that users only have access to the data and applications they need to do their jobs. And once again, technology is the double-edged sword in the race for better cybersecurity. As digital solutions and connectivity improve, they create a bigger attack surface, so better and faster security technologies are required to keep up. And not just keep up but also cause minimal inconvenience and disruption for the user. This requires highly agile and dynamic security policies, supported by contextual information and the maximum amount of data points available—and in real time. Who is this person? Where are they? What are they trying to access? Why do they need that access? Which device or endpoint are they coming in on?

Benefits of zero trust solutions

At their most serious, data breaches can be catastrophic. Your customers’ private data is at stake as are your finances, your intellectual property, and of course, your good reputation. Like insurance, security investments can seem like a big expense… until you need them. And then they look like a small price to pay to protect your business.

Some of the many benefits of zero trust solutions include:

Zero trust best practices: Getting started

There are several tasks that you will need to undertake once your zero trust transformation has begun. This includes cataloging your assets, defining segments within your organization, and classifying your data for a smoother transition.

Zero trust begins with a commitment and the following steps can help you get rolling:

In today’s world of euphemisms and careful language, zero trust may seem to your employees like a somewhat cynical term. So, get out in front of that when you introduce zero trust to your teams. Tell them at the outset that this in no way means you don’t trust them. It’s the cybercriminals that no one should trust—because they can make things seem like something they’re not. They can sneak in through the tiniest gaps and once they’re inside, they don’t care who they damage.

Zero trust and SAP

Secure your business with support from an innovative and reliable partner.

Visit the SAP Trust Center

Zero trust and SAP

Secure your business with support from an innovative and reliable partner.

Visit the SAP Trust Center