{"id":162479,"date":"2022-06-08T06:00:00","date_gmt":"2022-06-08T13:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=162479"},"modified":"2022-06-01T12:22:41","modified_gmt":"2022-06-01T19:22:41","slug":"balance-zero-trust-journey-with-the-speed-of-the-mission","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/06\/balance-zero-trust-journey-with-the-speed-of-the-mission\/","title":{"rendered":"How to Balance the Zero Trust Journey with the Speed of the Mission"},"content":{"rendered":"<p>It's been over a year since President Biden signed the <a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" rel=\"nofollow,noopener\" >Executive Order on Improving the Nation\u2019s Cybersecurity<\/a>, and we see many federal agencies making significant progress on their Zero Trust journey. Some are well-positioned to accelerate their efforts because of investments in digital transformation, which include rebuilding and improving their security approach. But, even these federal agencies are feeling more pressure to speed their Zero Trust journey, following the January release of the<a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/01\/M-22-09.pdf\" rel=\"nofollow,noopener\" > federal Zero Trust architecture strategy from the U.S. Office of Management and Budget<\/a>. The federal Zero Trust architecture strategy outlines aggressive Zero Trust implementation deadlines over the next two-and-a-half years.<\/p>\n<p>To protect government networks, infrastructure and data from growing digital threats, we\u2019re working with <a href=\"https:\/\/www.boozallen.com\/\" rel=\"nofollow,noopener\" >Booz Allen Hamilton<\/a> to assist federal agencies with implementing a Zero Trust roadmap and transforming how their users securely protect their data in a way that\u2019s tailored to the agency\u2019s mission and unique needs.<\/p>\n<p>Let\u2019s explore the<a href=\"https:\/\/www.paloaltonetworks.com\/zero-trust\"> concept of Zero Trust <\/a>and considerations for IT leaders in the federal space.<\/p>\n<h2><a id=\"post-162479-_hfib64v4loja\"><\/a>Zero Trust: A Complete Reevaluation of Security<\/h2>\n<p>Zero Trust is a strategic approach to cybersecurity, not a single product. It secures an organization by eliminating implicit trust and continuously validating every stage of a digital interaction. By adopting Zero Trust principles and architecture, organizations can build resilience into their IT networks and environments, simplify risk management, and improve operational efficiency.<\/p>\n<p>\u201cZero Trust is becoming especially critical in distributed, multicloud environments, and IT leaders across government are starting to take a security-first approach to all parts of implementation and architecture,\u201d explained Imran Umar, director of Zero Trust at Booz Allen. But, Imran cautions that Zero Trust isn\u2019t a solution that you apply or a technology that you adopt. Zero Trust covers everything from policy to operations, allowing the approach to truly permeate an organization.<\/p>\n<p>Applying a consistent, robust policy that secures users and data wherever they reside ensures overall safety from our digital society to our nation\u2019s security. In order for any organization to strengthen the protection of its most critical assets, it must accept that a compromise or breach is not an <em>if<\/em>, but a <em>when<\/em> reality. They must focus on limiting the impact of that risk.<\/p>\n<p>Ultimately, Zero Trust isn\u2019t a \u201cflip-the-switch\u201d effort to enhance cybersecurity. It will take time. And in truth, it\u2019s a continual journey. The good news is that your agency can start implementing the Zero Trust process anywhere, and you can use existing tools and capabilities to establish a starting line.<\/p>\n<h2><a id=\"post-162479-_8s5d8owulcwc\"><\/a>Where to Start Your Multiyear Zero Trust Journey<\/h2>\n<p>As an organization adopts additional and more diverse cloud and mobile technologies, the defined \u201cperimeter\u201d that is core to a traditional, perimeter-based, defense-in-depth strategy evaporates. Instead, the organization is left with a collection of many smaller surfaces to protect.<\/p>\n<p>By extending current firewall policies to the edge to support cloud and mobile users, organizations can migrate to a new Zero Trust architecture more seamlessly. Palo Alto Networks helps organizations integrate and unify advanced security into their cloud infrastructure, so users don\u2019t have to go through on-premises functionality.<\/p>\n<p>Booz Allen\u2019s Imran Umar recommends starting with a Zero Trust maturity assessment to understand the current state of your security and determine which key areas to tackle first. By conducting an audit of the tools and capabilities that your agency has now, then optimizing those products and solutions, you can jump-start your Zero Trust journey. If you have<a href=\"https:\/\/www.paloaltonetworks.com\/network-security\/next-generation-firewall\"> Palo Alto Networks Next-Generation Firewall<\/a>, for example, turn on relevant features to get full visibility into users, devices and apps. Broad visibility is a must for implementing a Zero Trust strategy and best practices.<\/p>\n<p>Many of our customers in the federal government are also currently looking at<a href=\"https:\/\/www.paloaltonetworks.com\/sase\/access\"> Palo Alto Networks Prisma Access SASE solution<\/a> as an easy entry point into Zero Trust. We\u2019re generally seeing increased interest throughout the federal government in adopting innovative solutions, like secure access service edge (SASE). More agencies are starting to shift away from a point-product perspective and adopt unified platforms that provide many services with reduced administrative overhead.<\/p>\n<h2><a id=\"post-162479-_cwtznanvg379\"><\/a>How to Balance the Move to Zero Trust with the Speed of the Mission<\/h2>\n<p>Having a clear roadmap for the Zero Trust journey and a maturity model to measure progress against is vital for federal agencies to help ensure continued leadership support for the journey. By leveraging the technical acumen of a combined Palo Alto Networks and Booz Allen Hamilton team, we can help agencies create both through a <a href=\"https:\/\/www.paloaltonetworks.com\/services\/consulting\">Zero Trust Professional Services engagement<\/a>. We can help with discovery and asset identification, your first Zero Trust implementation, process improvement and more. A Professional Services engagement can help condense the timeline of your agency\u2019s move to Zero Trust and provide several benefits:<\/p>\n<ul>\n<li>A repeatable and predictable security strategy.<\/li>\n<li>Significant risk reduction with fewer breaches.<\/li>\n<li>Higher confidence in security controls.<\/li>\n<li>Simplified operations through automation.<\/li>\n<\/ul>\n<p>We often hear from the agencies we work with that they\u2019re concerned about disrupting their speed, performance and mission assurance as they deploy Zero Trust. Separating the journey into three areas \u2013 users, applications and infrastructure \u2013 can help to control the scope and impact of the journey.<\/p>\n<p>At Palo Alto Networks, we refer to these areas as the three \u201cpillars\u201d of a Zero Trust Model. The figure below outlines the actions that must be taken consistently with these pillars: establishing identity by using the strongest authentication possible \u2013 verifying the device and workload, securing access and securing all transactions.<\/p>\n<p><div style=\"max-width:100%\" data-width=\"1680\"><span class=\"ar-custom\" style=\"padding-bottom:41.07%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone wp-image-162481 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/word-image.jpeg\" alt=\"Image of three pillars depicting Zero Trust principles: Zero Trust for Users, Zero Trust for Applications, Zero Trust for Infrastructure.\" width=\"1680\" height=\"690\" \/><\/span><\/div><\/p>\n<h2><a id=\"post-162479-_u040jnxshuqz\"><\/a>Automation as a Zero Trust Accelerator<\/h2>\n<p>Zero Trust is a methodology, but it needs to be supported by the right tools, including those for orchestration and automation. When the administrative burden of a Zero Trust strategy becomes too great, it runs counter to the original goal of simplifying security. To help minimize the impact of that strategy, including mission timelines and performance, look to automate and orchestrate any tasks you can. Palo Alto Networks<a href=\"https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xsoar\"> Cortex XSOAR<\/a> \u2013 our security orchestration automation and response platform \u2013 can help. In fact, we use it in our own internal execution of Zero Trust.<\/p>\n<p>Here\u2019s another tip for speeding and amplifying your agency\u2019s Zero Trust journey: Formulate your strategy in parallel with your overall efforts to transform digitally, including network transformation, data center and cloud migration, as well as SecOps transformation, so you can modernize and rebuild IT while meeting your Zero Trust objectives.<\/p>\n<h2><a id=\"post-162479-_98yg03be874k\"><\/a>Why Work with Palo Alto Networks and Booz Allen Hamilton on Zero Trust<\/h2>\n<p>Government and military leaders turn to Booz Allen Hamilton to solve their most complex problems. They rely on the firm\u2019s agility and mission-specific technical expertise to bring together unique teams of subject-matter experts who partner with them in the design, development and implementation of powerful solutions.<\/p>\n<p>Palo Alto Networks provides a platform approach to security that enables the consistent application of security posture wherever a user, data, application, asset or service resides. Our technology architecture is single plane, and with our nearly universal integration across products in the Zero Trust solution area, our combined team can build an architecture that meets the needs of your organization.<\/p>\n<p>Together, Palo Alto Networks and Booz Allen Hamilton can equip your federal agency with the insight it needs to deploy Zero Trust intelligently while optimizing for speed, performance and mission assurance to transform how your users securely access the cloud. Whether it\u2019s for a free Zero Trust informational workshop, a maturity assessment or a Professional Services engagement, <a href=\"https:\/\/www.paloaltonetworks.com\/industry\/federal#public-sector-contact-form\">get in touch with our cybersecurity solutions experts <\/a>to see how we can help your organization balance Zero Trust with the speed of the mission.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal agencies are feeling more pressure to speed their Zero Trust journey, following the January release of the federal Zero Trust architecture strategy from the U.S. Office of Management and Budget. <\/p>\n","protected":false},"author":723,"featured_media":162496,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6717,6769],"tags":[3779,73],"coauthors":[8665],"class_list":["post-162479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-products-and-services","category-public-sector","tag-sled","tag-zero-trust"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/I-See-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=162479"}],"version-history":[{"count":4,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162479\/revisions"}],"predecessor-version":[{"id":162526,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/162479\/revisions\/162526"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/162496"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=162479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=162479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=162479"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=162479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}