Cybersecurity In-Depth: Feature articles on security strategy, latest trends, and people to know.

7 Steps for Navigating a Zero-Trust Journey

Don't think of zero trust as a product. Think of it as "how you actually practice security."

Steve Zurier, Contributing Writer, Dark Reading

December 29, 2021

8 Slides

Already have an account?

Zero trustAdobe Stock: Oliver Le Moal

Few technology concepts have been more confused and distorted as zero trust. The Biden administration has endorsed zero trust. The security industry has endorsed it. Yet security pros are still left wondering whether it’s a concept and philosophy – or simply a product a company can install?

Vendors continue to muddy the waters by talking about their “zero-trust solution,” but as Joseph Carson, chief security scientist and advisory CISO at ThycoticCentrify, explains: “Think of zero trust as a way to operate the business in a secure way. It’s about how you actually practice security. There may be products with zero-trust-like features, but all you’ve done is implement a feature that applies a zero-trust principle.”

So for this feature we talked to security pros, and they all agree: Zero trust is not a product a security team can purchase and install. While tools like single sign-on (SSO), multi-factor authentication (MFA), and identity management enable zero trust, it’s important to view zero trust as a move away from perimeter security based on firewalls and to a modern approach that uses cloud-based mobile authentication tools that let people securely work from anywhere. 

The following seven tips offer a road map for understanding the shift in mindset and what companies need to start their zero-trust journey.

About the Author

Steve Zurier

Contributing Writer, Dark Reading

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights