{"id":62265,"date":"2023-03-23T09:50:52","date_gmt":"2023-03-23T13:50:52","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=62265"},"modified":"2023-08-30T09:39:58","modified_gmt":"2023-08-30T13:39:58","slug":"unexpected-roadblocks-zero-trust","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/unexpected-roadblocks-zero-trust","title":{"rendered":"6 Unexpected Roadblocks Organizations Face with Zero Trust Security"},"content":{"rendered":"\n
It seems like everyone is singing the praises of Zero Trust security \u2014 even United States President Joe Biden. <\/p>\n\n\n\n
Last year, the president signed an executive order<\/a> aimed at migrating the federal government to a Zero Trust Architecture (ZTA). <\/p>\n\n\n\n Biden said the government was adopting ZTA to \u201cmodernize its approach to cybersecurity and today\u2019s dynamic and increasingly sophisticated cyber threat environment.\u201d The Office of the President<\/a> went on to say the cybersecurity framework would enable departments to \u201ctighten access controls.\u201d<\/p>\n\n\n\n If you\u2019ve worked in the IT industry long enough, you probably know one thing to be true when it comes to project management: expect the unexpected. Anomalies are inevitable and, unfortunately, reality doesn\u2019t always meet ideals. <\/p>\n\n\n\n Despite the publicity, only 23% of small and medium-sized enterprises (SMEs)<\/a> have fully adopted Zero Trust security programs to date. SMEs often cite budgetary constraints, labor shortages, integration difficulties, and lack of knowledge as reasons for not adopting Zero Trust (ZT). <\/p>\n\n\n\n At 探花大神, the most common misconception we come across is that ZT must involve several moving pieces at once. In this article, we\u2019ll discuss the most common Zero Trust challenges that stop IT managers in their tracks and how to overcome them. Let\u2019s get started:<\/p>\n\n\n\n The concept of \u201cZero Trust\u201d is deceptively simple. It means that any devices, users, and applications attempting to access an IT resource of any kind must first receive validation. The mantra \u201ctrust nothing, verify everything\u201d is ubiquitous with the security framework. <\/p>\n\n\n\n So instead of granting implicit trust<\/em> upon the initial entry to a protected network, organizations evaluate an opinion of trustworthiness based on context, and at every access transaction.<\/p>\n\n\n\n Questions like these are answered via policy checks as end users seek network access. Though simple in philosophy, transitioning from a traditional, on-prem security program to a comprehensive ZT model doesn\u2019t happen overnight. <\/p>\n\n\n\n In fact, Forrester found<\/a> the process takes an average of 1 to 3 years<\/strong> from start to finish. With that said, a little strategic planning can make for a much smoother ride. Below are the six most common roadblocks we see customers encounter while switching to Zero Trust: <\/p>\n\n\n\n While it\u2019s easy to implement ZTA for a startup, more established organizations must deal with the existing infrastructures they already have in place. And most of them are severely outdated! <\/p>\n\n\n\n Admins must take precautions when modifying existing infrastructures with new ZTA tools. Those who rush the process have been known to slow down or even break crucial systems. In addition, completely overhauling a legacy system is expensive if it has yet to deliver ROI. <\/p>\n\n\n\n We recommend developing a roadmap to gradually launch Zero Trust security elements over time. This way, you can leverage your existing infrastructure to optimize costs. And, you will significantly reduce the likelihood of experiencing major \u201coopsies.\u201d <\/p>\n\n\n\n<\/figure>\n\n\n\n
When Reality Fails to Meet Expectations with Zero Trust<\/h2>\n\n\n
<\/figure><\/div>\n\n\n
\n
1. Leaving Legacy Technology Behind<\/h3>\n\n\n\n