{"id":141524,"date":"2021-09-13T06:00:43","date_gmt":"2021-09-13T13:00:43","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=141524"},"modified":"2021-10-12T01:19:41","modified_gmt":"2021-10-12T08:19:41","slug":"zero-trust-answers-top-questions","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2021\/09\/zero-trust-answers-top-questions\/","title":{"rendered":"Zero Trust: Short Answers to Agencies\u2019 Top Questions"},"content":{"rendered":"<p>Government agencies have been stepping up efforts to adopt a Zero Trust architecture since May, when President Biden signed the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" rel=\"nofollow,noopener\" >Executive Order on Improving the Nation\u2019s Cybersecurity<\/a>. Many of these agencies and other organizations in the public sector were already laying the groundwork for Zero Trust before the Executive Order as part of their digital transformation journey, which includes rebuilding and improving their security approach.<\/p>\n<p>We know that there are still a lot of questions about Zero Trust and that agencies may be wondering what it means to deploy a Zero Trust Enterprise approach with help from Palo Alto Networks. We thought we would lay out a few need-to-know basics about Zero Trust for agencies to keep in mind as they move forward in their cybersecurity journey.<\/p>\n<h2><a id=\"post-141524-_heading=h.2otesry2pkzt\"><\/a>What Is Zero Trust?<\/h2>\n<p>By definition, Zero Trust is a strategic approach to cybersecurity that secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction.<\/p>\n<p>The core idea of Zero Trust is to \u201cnever trust, always verify.\u201d Organizations can no longer inherently trust whatever is inside their security perimeter. As the perimeter has evolved and IT environments have become far more complex, organizations must continually authenticate, authorize and verify who and what can access an environment to grant \u201cleast privilege\u201d access. Authorization is based on who or what is requesting access, the context of the request and the risk level.<\/p>\n<p>Deployed properly, Zero Trust is a strategic approach to cybersecurity that simplifies risk management to a single use case: the removal of all implicit trust for users, applications and infrastructure.<\/p>\n<h2><a id=\"post-141524-_heading=h.cklwatipbqha\"><\/a>What Is the Value of Adopting a Zero Trust Strategy?<\/h2>\n<p>Zero Trust is a way for government agencies and other organizations to build resilience into their IT networks and environments. With Zero Trust as a strategic framework for guiding the agency\u2019s security approach, the agency can keep moving forward with its mission, even if its environment is compromised.<\/p>\n<p>Zero Trust can also serve as a North Star to guide an organization\u2019s future security investments. Whatever the threat du jour may be, it won\u2019t be the force driving the agency\u2019s decision-making around security spending. By moving to Zero Trust, an organization can lower its costs in several ways:<\/p>\n<ul>\n<li>Reducing risk by eliminating implicit trust for users, applications and infrastructure.<\/li>\n<li>Achieving better security outcomes by deploying the most rigorous security checks.<\/li>\n<li>Adopting a simplified, consistent security posture that is less expensive to manage.<\/li>\n<\/ul>\n<h2><a id=\"post-141524-_heading=h.bh93zcgq9g8u\"><\/a>How Does an Organization Become a Zero Trust Enterprise?<\/h2>\n<p>Zero Trust starts with determining what you already have and what you need to reduce acute risk and achieve resilience. Government agencies and other organizations in the public and private sector should approach Zero Trust based on the intersection of users, apps and infrastructure with identity, devices\/workloads, access and transactions.<\/p>\n<p>Here\u2019s what the approach looks like:<\/p>\n<p><div style=\"max-width:100%\" data-width=\"2156\"><span class=\"ar-custom\" style=\"padding-bottom:36.73%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-141551 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/09\/ZT-chart-1.png\" alt=\"Chart of steps for Zero Trust approach.\" width=\"2156\" height=\"792\" \/><\/span><\/div><\/p>\n<p>You can begin implementing the Zero Trust process anywhere. Starting points might include <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-zero-trust-network-access\">Zero Trust Network Access<\/a>, DevSecOps, <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-microsegmentation\">microsegmentation<\/a> or third-party management.<\/p>\n<h2><a id=\"post-141524-_heading=h.ylfad4r0odu2\"><\/a>What Are the Key Elements of the Zero Trust Enterprise Approach?<\/h2>\n<p><strong><br \/>\n<\/strong> Palo Alto Networks is uniquely positioned to deliver Zero Trust Enterprises because, unlike other vendors, we offer a broad, high-quality and integrated set of capabilities. We help enable and ensure Zero Trust by eliminating all implicit trust across users, applications and infrastructure.\u00a0These important elements help distinguish our approach:<\/p>\n<ul>\n<li><strong>Comprehensive<\/strong>: Zero Trust should never focus on a narrow technology.\u00a0It must instead consider the full ecosystem of controls \u2013 network, endpoint, cloud, application, the Internet of Things, identity and more \u2013 which organizations rely on for protection.<\/li>\n<li><strong>Actionable<\/strong>: Comprehensive Zero Trust isn\u2019t easy; however, getting started shouldn\u2019t be hard.<\/li>\n<li><strong>Intelligible<\/strong>: A Zero Trust approach should be concise and easy for nontechnical executives to understand.<\/li>\n<li><strong>Ecosystem Friendly<\/strong>: In addition to having one of the most comprehensive portfolios in the market, we work with a broad ecosystem of partners to help enable all aspects of the Zero Trust Enterprise.<\/li>\n<\/ul>\n<p>Here\u2019s what our Zero Trust Enterprise framework looks like, and how various technology products help to support it:<\/p>\n<p><div style=\"max-width:100%\" data-width=\"2152\"><span class=\"ar-custom\" style=\"padding-bottom:38.01%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-141564 size-full lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/09\/ZT-chart-2.png\" alt=\"Zero Trust Enterprise framework example.\" width=\"2152\" height=\"818\" \/><\/span><\/div><\/p>\n<h2><a id=\"post-141524-_heading=h.50twhgbnvn18\"><\/a>What About Taking Zero Trust to the Cloud?<\/h2>\n<p>Hopefully, the information presented above helps to answer some basic questions you might have about Zero Trust and how Palo Alto Networks can help support your journey. One final question we\u2019ll cover here is one we\u2019re hearing often from government agencies: \u201cHow challenging is it to extend Zero Trust policies to the cloud?\u201d<\/p>\n<p>The challenge is that today, the majority of apps are now directly delivered from the cloud, public or private, with direct-to-app and rapid development models fundamentally disrupting app delivery and consumption models for your users. This creates a rift with the legacy, castle-and-moat approach in a traditional data center; bringing with it new risks as a consequence of the implied trust granted to IaaS, PaaS and app delivery platforms. A new mindset and a disruptive approach is needed to discover and eliminate implied trust in this ecosystem.<\/p>\n<p>Recently, the Palo Alto Networks federal team worked with a federal agency to extend its segmentation program for critical data from an on-premises environment to the cloud. The agency is taking advantage of the single policy engine in our <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/panorama\">unified policy management platform<\/a>, Panorama, to apply the same Zero Trust policies in both environments without the need to design anything new.<\/p>\n<p>Visit our website for more information on how <a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/zero-trust\">Zero Trust architecture fuels digital transformation<\/a>. If you\u2019d like to learn more about how we can help your agency become a Zero Trust Enterprise, our <a href=\"https:\/\/www.paloaltonetworks.com\/services\/consulting\">Professional Services team<\/a> can assist you with Zero Trust architecture design, implementation or both, depending on your organization\u2019s needs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal agencies have been stepping up efforts to adopt a Zero Trust strategy since May, when President Biden signed the Executive Order.<\/p>\n","protected":false},"author":723,"featured_media":141578,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6769],"tags":[73],"coauthors":[7422],"class_list":["post-141524","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-public-sector","tag-zero-trust"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2021\/09\/In-All-Seriousness.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/141524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=141524"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/141524\/revisions"}],"predecessor-version":[{"id":142175,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/141524\/revisions\/142175"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/141578"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=141524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=141524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=141524"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=141524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}