Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Implement a Modern Zero Trust Security Model
Cybersecurity

How to Implement a Modern Zero Trust Security Model

Cybersecurity as an Enabler
Chris HughesBy Chris HughesNovember 29, 2021Updated:April 15, 20223 Mins Read
Facebook Twitter LinkedIn Email
Zero Trust
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

If you’re anywhere in the IT or cybersecurity industry today, one phrase is among the most pervasive, and that’s Zero Trust. For example, the Cybersecurity Executive Order (EO) mentions it 11 times.

But what exactly is Zero Trust? And why is it considered so important in today’s digitally connected ecosystem?

Zero Trust isn’t a new term or concept; organizations such as Google and Forrester have been evangelizing the concept for a decade. You’ll no doubt hear countless definitions and explanations of this concept when talking to IT professionals. The best bet is getting guidance from reputable organizations not tied to any specific vendors or technologies. These include the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA), both of which have released their own guidance. The National Institute of Standards and Technology (NIST) publication 800-207 Zero Trust Architecture is another great place to begin learning more about it.

At a high level, Zero Trust is a security model focused on the reality that cybersecurity threats exist both within and external to an organization and its system boundaries. Traditional security was predicated on a wall and moat style of defense, with a tough exterior and soft inside. But that is an antiquated way of approaching cybersecurity, and it essentially allows malicious actors to run rampant once they breach that fortified perimeter. It is also a failure-prone model when you consider the prevalence of insider threats and the reality that they often don’t need to traverse the perimeter whatsoever.

Pillars of Zero Trust

Zero Trust is predicated on some fundamental principles, such as never trusting, assuming a breach has already occurred, and explicitly verifying all access requests. CISA’s Zero Trust Maturity Model is structured around 5 pillars: identity, device, network/environment, application/workload, and data. This is all on a foundation of visibility and analytics, automation and orchestration, and governance.

In many ways, it’s a reiteration of traditional security practices, such as least permissive access control and continuous monitoring. That said, it is further advanced by the rapid maturation in technology capabilities. Utilizing modern Zero Trust tools from cloud service providers and third-party vendors, organizations can implement capabilities that were once very difficult, if not impossible. That includes things such as contextual access control where you can take criteria such as geographic location, device posture, user behavioral analytics, and more into consideration to support access decisions. Microsoft Azure’s conditional access control policies, which utilize signals to support decisions and enforcement, is a perfect example of this.

Data at the center of protection

Zero Trust essentially shifts from a location-centric model, which is gone in the modern remote workforce paradigm, and shifts to a data-centric approach. Implementing controls between users, systems, data, and your organizational assets is absolutely critical to mitigating risk. Today’s digitally driven economy is predicated on digital platforms and technologies and supported by a workforce that is no longer geographically constrained. That means your security model shouldn’t be either.

Organizations should be adopting a Zero Trust security model that revolves around key principles and practices that put data at the center of your protection efforts and don’t require legacy ways of thinking in terms of internal and external threats. Every access request can pose a threat and should be treated as such. Adversaries are ultimately after the data, and that’s where we should be prioritizing our security efforts accordingly. Adopting a Zero Trust model of security helps get organizations closer to this reality.

Cybersecurity Cybersecurity channel Cybersecurity is an Enabler featured
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

Arvind Krishna’s Next IBM Miracle

May 13, 2025

ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny

May 13, 2025

Arvind Krishna Restoring IBM to Former Glory

May 13, 2025

Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications

May 12, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Arvind Krishna’s Next IBM Miracle
  • ServiceNow Takes Major Steps Toward ‘Operating System of the Enterprise’ Destiny
  • Arvind Krishna Restoring IBM to Former Glory
  • Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications
  • How Google Cloud Is Leading the AI Revolution Through Customer-Centric Innovation

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.