5 Key Steps to Implementing a Zero Trust


Sam Taylor
Apr 20, 2021

While quite a pessimistic term, in the security world Zero Trust encourages the organisation to look at their systems more holistically and take a tough stance on data coming in regardless if it’s internal or external. The core tenant of Zero Trust is, as the name suggests ‘trust no one’ and has been developed to combat the more sophisticated cyber threats.

Zero Trust represents the next step from traditional castle-moat approach whereby businesses focus on securing perimeters. With COVID-19 forcing an accelerated adoption of remote working most organisations workers are outside of these traditional security perimeters and Zero Trust takes the approach of assuming that the user and device is compromised. This means that the user should always be verified, access and privileges should be limited to only what is required and constantly monitored to gain visibility on user behaviour to identify anomalous behaviour. This method isn’t simply focused on keeping the bad stuff out though, it also investigates what is roaming freely within the network as well.


Implementing Zero Trust

‘How do I transition to this new way and what do I need to do?’ I hear you ask; if you are asking the question, then you’re on your way, as defining what a Zero Trust approach looks like for your business is the first step.

5 key processes every business looking to implement Zero Trust should be following:

  1. Define Zero Trust for your business: It is important to sit down and discuss what Zero Trust means to you and how will it look in your organisation. At this point, it’s not necessary to get hung up on the technology, it is about the commitment to look at things differently and what change that can bring. The commitment to make it happen is key.

  2. Consider the End User: The Zero Trust approach of never trusting and always verifying can change how users interact with your systems and data. You need to know who your users are, what apps they are accessing how they are connecting to your apps and the controls you have in place for securing that access. I like to think about a clear focus on the user experience whilst considering what are you willing to trade off for security.

  3. Design your Process: It’s a bit like the schoolteacher that says ‘there is no wrong answer’… The great part of this exercise is that there is no single one approach for the implementation, Zero Trust is about protecting your applications by ensuring that only securely authenticated users and devices have access to them. Where you are on the network matters less than how well authenticated you are and how trustworthy your device is.

  4. Implement: Put your theory into practise and make the necessary changes to your systems which may include enhancing user passwords with multifactor authentication (MFA) and additional verification steps to determine the level of access to be granted for each user. Remember; Zero Trust principles need to apply regardless of user type—end user, privileged user, outsourced IT, partner or customer—or the resource being accessed. Your access decisions need to be adaptive and dynamic.

  5. Plan for the Challenges: We know that with any change comes challenges. This is a great time to think about how you will address the challenges when they come and the process to seeing them resolved. The ideal state being achieving a balance that allows the user to work productively, safely, anywhere.

Dicker Data Security Solutions

Dicker Data partners with industry leading security vendors to ensure the New Zealand IT reseller community have access to a full suite of technology designed to fight cybercrime, protect data, reduce risk and organisation down time.

Our dedicated team work closely with our New Zealand IT reseller partners to understand the business requirements of their customers and deliver tailored, leading-edge security solutions. Dicker Data IT partners can leverage the experience from our local team of sales, technical and product management specialists, as well as leverage promotions and incentives.

To learn more get in contact with our Security Specialist Sam Taylor

Sam Taylor
20/04/2021 12:07:57 AM

Business Manager - Security
More Posts by Sam Taylor