{"id":165188,"date":"2022-06-30T09:30:49","date_gmt":"2022-06-30T16:30:49","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=165188"},"modified":"2022-07-18T11:52:36","modified_gmt":"2022-07-18T18:52:36","slug":"zero-trust-is-essential-in-a-post-pandemic-world","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/06\/zero-trust-is-essential-in-a-post-pandemic-world\/","title":{"rendered":"Demystifying ZTNA 2.0 with Deloitte"},"content":{"rendered":"<h2><b data-stringify-type=\"bold\">Why Zero Trust Is Essential in a Post-Pandemic World<\/b><\/h2>\n<p><i data-stringify-type=\"italic\">This blog is part of our \u201c<\/i><i data-stringify-type=\"italic\"><a class=\"c-link\" tabindex=\"-1\" href=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ztna-partners\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-stringify-link=\"https:\/\/www.paloaltonetworks.com\/blog\/tag\/ztna-partners\/\" data-sk=\"tooltip_parent\" data-remove-tab-index=\"true\">ZTNA Partners<\/a><\/i><i data-stringify-type=\"italic\">,\u201d a series where we take a closer look at how our partnerships protect today's hybrid workforces and environments with ZTNA 2.0.<\/i><\/p>\n<p>Digital transformation is not a \u201csomeday\u201d goal but a \u201ctoday\u201d imperative. In this post-pandemic world, work is no longer just a place we go, but an activity we perform, with <a href=\"https:\/\/info.flexera.com\/CM-REPORT-State-of-the-Cloud?lead_source=Website%20Visitor&amp;id=Flexera.com-PR\" rel=\"nofollow,noopener\" >82% of organizations<\/a> adopting a hybrid cloud strategy. In fact, most organizations use an <a href=\"https:\/\/www.statista.com\/statistics\/1233538\/average-number-saas-apps-yearly\/\" rel=\"nofollow,noopener\" >average of 110 SaaS apps<\/a> within their environments. And, part of the challenge isn't just that apps are everywhere, but users are too \u2013 expanding the attack surface dramatically. When combined with a threat landscape that\u2019s becoming more sophisticated, it's a perfect storm that demands organizations do something different to limit exposure and provide better security.<\/p>\n<p>Interest in and adoption of Zero Trust Network Access (<a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-zero-trust-network-access-ztna\">ZTNA<\/a>) has exploded. However, the rapid transformation to hybrid work and hybrid networks\/clouds has exposed weaknesses in the first ZTNA approaches. As part of our unveiling of <a href=\"https:\/\/www.paloaltonetworks.com\/sase\/ztna\">ZTNA 2.0<\/a> with Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/sase\/access\">Prisma\u00ae Access<\/a>, I sat down with Andrew Rafla, Partner\/Principal and Cyber Risk\/Zero Trust Leader at Deloitte, to help demystify ZTNA and its evolution:<\/p>\n<p>\u201cOne of the biggest challenges in achieving a Zero Trust state and truly moving toward this concept of \u2018never trust, always verify\u2019 is the fundamental understanding of the application and user estate,\u201d Andrew told me. \u201cIn other words, what applications exist within a client\u2019s environment, who should be able to access those applications, and under what conditions. These are fundamental questions that need to be answered, and <em>only<\/em> a <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-zero-trust-network-access-2-0\">ZTNA 2.0<\/a> model helps to fully realize the benefits of the zero trust model.\u201d<\/p>\n<h2><a id=\"post-165188-_l1x24480zxi9\"><\/a>The Shortcomings of ZTNA 1.0<\/h2>\n<p>Previous iterations of ZTNA fall short of these requirements. First and foremost, the first generation of ZTNA vendor implementations (which we call ZTNA 1.0) violate the core foundational principle of least privilege access by using an application\u2019s IP address or port number as a proxy for the application itself. Defining an application by network constructs invariably leads to a broad degree of access.<\/p>\n<p>Imagine the analogy of securing a commercial airline flight. You show your boarding pass and driver's license when you go to an airport. Your license serves as a user ID, your boarding pass represents a resource to gain access \u2013 one plane at a specific gate, departure date and time, one seat in a specific section. With ZTNA 1.0, you get a boarding pass that just shows an IP address (essentially providing the address of the airport, but not limiting access to any plane at the airport).<\/p>\n<p>The second limitation of ZTNA 1.0 is around \u201callow and ignore.\u201d Just because you get past TSA security doesn't mean you can do whatever you want. You can\u2019t disrupt flight attendants, or ignore rules. So you need continuous trust verification via continuous monitoring.<\/p>\n<p>The third limitation has to do with data inspection and security. Returning to the airport analogy, this means that not only are the passengers (users) inspected, but also the luggage (data).<\/p>\n<p>In a post-pandemic world, a ZTNA 2.0 model addresses these fundamental shortcomings to better protect today\u2019s hybrid workforce.<\/p>\n<h2><a id=\"post-165188-_gzic1qsiwyn3\"><\/a>Why Is Zero Trust Essential in a Post-Pandemic World?<\/h2>\n<p>In the decade since Zero Trust was first introduced, the business environment has shifted dramatically. In our post-pandemic world, organizations realize their employees need flexibility not only where they work, but how they work and the applications they now utilize to get their work done.<\/p>\n<p>\u201cThe mobile and the hybrid workforce is here to stay,\u201d Andrew explained during our conversation. \u201cMore and more organizations are realizing that people just want to work for organizations that provide flexibility in how they work and where they work and the devices that they work from. One of the considerations around achieving a Zero Trust environment is really about supportability \u2013 supporting the increasingly mobile and hybrid workforce. That requires compatibility with both traditional laptop and desktop devices, as well as the common operating systems found on mobile devices.\u201d<\/p>\n<p>ZTNA 2.0 addresses these organizational requirements while maintaining the core fundamental principle of least-privileged access. It offers a consistent, frictionless end-user experience that maximizes security capabilities without any additional burden. And finally, it enables continuous trust verification \u2013 providing deep security and data protection for all applications.<\/p>\n<h2><a id=\"post-165188-_30j0zll\"><\/a>The Journey to Adopting ZTNA 2.0<\/h2>\n<p>When I asked Andrew what advice he would offer to organizations looking to adopt ZTNA 2.0, he offered several suggestions:<\/p>\n<ol>\n<li><strong>Prioritize Business Needs over Technology<\/strong> \u2013 It\u2019s important that organizations don\u2019t look at Zero Trust adoption as a rip-and-replace technology initiative. Rather, it should support key business initiatives in a way that will allow the organization to be more secure, agile and resilient to change.<\/li>\n<li><strong>Drive Consensus around the Need for Zero Trust<\/strong> \u2013 It\u2019s not just the cybersecurity team, but also IT operations, help desk, end users and other business stakeholders.<\/li>\n<li><strong>Take an Iterative and Incremental Approach <\/strong>\u2013 Start with low-risk targets, such as a low-risk user population and\/or set of applications, to minimize the potential for operational impact and implement lessons learned along the journey. Ultimately you can adopt those lessons learned for the company\u2019s highest-value \u201ccrown jewels\u201d \u2013 its mission-critical applications and data.<\/li>\n<\/ol>\n<p>The journey toward Zero Trust is one that prioritizes business needs over technology \u2013 putting organization on the path to be more secure, agile and resilient to change in a post-pandemic world.<\/p>\n<p>Palo Alto Networks Prisma Access is the industry\u2019s only ZTNA 2.0 solution. Combined with Deloitte\u2019s Zero Trust framework and professional services, Prisma Access helps organizations accelerate the adoption of a Zero Trust cybersecurity strategy.<\/p>\n<p>To learn more about Prisma Access and ZTNA 2.0, watch the <a href=\"https:\/\/start.paloaltonetworks.com\/zero-trust-with-zero-exceptions\">ZTNA 2.0 Launch Event<\/a> on-demand.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The rapid transformation to hybrid work and hybrid networks\/clouds has exposed weaknesses in the first ZTNA approaches in this post-pandemic world. <\/p>\n","protected":false},"author":723,"featured_media":165189,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[78,6724,6717],"tags":[7907,8529,8732],"coauthors":[7209],"class_list":["post-165188","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-partners","category-points-of-view","category-products-and-services","tag-hybrid-workforce","tag-ztna-2-0","tag-ztna-partners"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/06\/WFH-Woman-2-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/165188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=165188"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/165188\/revisions"}],"predecessor-version":[{"id":167818,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/165188\/revisions\/167818"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/165189"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=165188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=165188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=165188"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=165188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}