Clarity and Transparency: How to Build Trust for Zero Trust

Be
impeccable
with
your
words.
It’s
the
first
of
the
Four
Agreements

a
set
of
universal
life
principles
outlined
in
the
bestselling


Be
impeccable
with
your
words
.
It’s
the
first
of
the
Four
Agreements

a
set
of
universal
life
principles
outlined
in
the
bestselling

book

by
Don
Miguel
Ruiz.
‘Being
impeccable
with
your
words’
is
my
favorite,
and
it’s
no
surprise.
As
a
product
marketer,
I
spend
most
of
my
daily
existence
casting
about
for
the
perfect
word
to
use
in
web
copy,
a
webinar,
or
video
script.


Words
can
connect
us,
as
well
as
divide
us
.
In
helping
to
develop
the
message
that
Cisco
takes
to
the
market
about

zero
trust,

I
try
to
be
as
impeccable
as
I
can
with
each
word.
After
all,
cybersecurity
is
too
important
to
be
cavalier
about
what
is
possible

within
a
particular
use
case,
product,
or
service.


Clarifying
what
zero
trust
means
to
you
comes
first
.
The

zero
trust
principles

reflect
another
of
the
four
agreements:
‘Don’t
make
assumptions’.
Don’t
assume
that
a
user
or
device
is
trusted
based
on
their
presence
on
the
network,
their
type
of
device,
or
any
other
aspect
of
the
connection
request.
Instead,
verify
it.

At
the
same
time,
don’t
assume
that
everyone
in
your
organization
is
in
accord
with,
or
clear
on
the
goals
of
a
zero
trust
initiative.
Confirm
goals
and
clearly
communicate
them.
Over
the
past
year,
I’ve
met
with
several
customers
keen
to
embark
on
zero
trust
and
generally
those
goals
involve
one
or
more
of
the
following:



  • Modernizing
    user
    access


    secure
    remote
    access
    for
    users
    to
    SaaS-based,
    and
    private,
    on-premises
    apps


  • Assessing
    and
    validating
    device
    health

    increase
    visibility
    into
    device
    posture
    and
    using
    this
    data
    to
    make
    a
    policy
    decision
    (e.g.,
    prompt
    users
    to
    self-remediate
    before
    getting
    access)


  • Accelerating
    cloud
    migratio
    n


    accurately
    enforce
    micro-segmentation
    across
    your
    entire
    application
    landscape

    at
    scale


  • Orchestrating
    SOC
    workflow
    s


    gain
    actionable
    insights
    to
    automate
    threat
    response
    across
    networks,
    cloud,
    endpoints,
    email,
    and
    applications


  • Securing
    mixed
    environments

    consistently
    apply
    a
    “never
    trust,
    always
    verify,
    least-privilege
    policy”
    across
    OT
    and
    IT
    networks,
    public
    and
    private
    clouds,
    managed
    and
    unmanaged
    devices,
    and
    employees
    and
    contractors.


The
phrase
zero
trust
does
not
inspire
trust,
clarity,
or
transparency
.
No
name
is
perfect,
but
the
challenge
with
calling
an
architecture
that
is
consistent
with
a
‘never
assume
trust,
always
verify
it,
and
enforce
the
principle
of
least-privilege’
policy
zero
trust

is
that
it
sends
the
message
that
‘one
cannot
ever
be
trusted’.



Changing
the
mindset
of
anyone
is
already
a
complex
undertaking,
but
starting
off
with
a
lack
of
trust
(even
if
it’s
only
a
word)
doesn’t
help.

Essential cultural accelerators to Zero Trust: Relationships drive Zero Trust


Zero
trust
is
simply
good
security
.
Zero
trust
is
a
conversation
about
the
totality
of
the
security
stack,
and
how
to
bring
it
to
bear
in
ways
that
allow
teams
to…

  • consistently
    and
    continually
    verify
    user
    and
    device
    trust;
  • enforce
    trust-level
    access
    based
    on
    least
    privilege
    access;
  • and
    respond
    to
    change
    in
    trust
    to
    protect
    data
    and
    recover
    quickly
    from
    incidents.

Simply
put,
make
sure
that
one
only
has
access
to
resources
they
need
and
that
any
violations
of
this
policy
are
investigated.



So…
how
do
we
build
the
trust
necessary
for
zero
trust
adoption?


Relationships
build
trust

an
essential
ingredient
for
zero
trust
momentum
.
In
the

Harvard
Business
Review’s
“Begin
with
Trust
”,
Frances
Frei
and
Anne
Morriss
describe
three
key
drivers
for
trust:
authenticity,
logic,
and
empathy.
Perhaps
we
can
apply
these
drivers
within
the
context
of
zero
trust
security:


  • Authenticity


    are
    we
    truly
    aligned
    on
    the
    goals
    of
    a
    zero
    trust
    rollout?
    Have
    we
    clearly
    communicated
    our
    intentions
    and
    progress
    to
    our
    users,
    business
    leaders,
    and
    other
    stakeholders?


    • How
      to
      cultivate:

      Be
      as
      transparent
      as
      possible.
      For
      example,
      share
      lessons
      learned

      including
      mistakes

      during
      each
      phase
      of
      the
      initiative.
      Publish
      dashboards
      and
      other
      reports
      on
      milestones
      and
      metrics
      (e.g.,
      #
      of
      users
      enrolled,
      #
      of
      apps
      protected,
      etc.).

  • Logic

    have
    we
    clearly
    explained
    the
    rationale
    behind
    the
    change
    in
    policy,
    user
    workflows,
    as
    well
    as
    the
    benefits
    of
    adopting
    zero
    trust?


    • How
      to
      cultivate:

      Appeal
      to
      everyone’s
      bottom
      line:
      saving
      money
      and
      making
      your
      job
      easier.
      Zero
      trust
      can
      save
      money
      (refer
      to
      our
      TEI
      studies
      and
      ROI
      blog
      article
      from
      CIO’s
      office)
      and
      done
      right,
      can
      simplify
      IT
      management
      and
      empower
      users
      to
      fix
      issues
      on
      their
      own.

  • Empathy

    have
    we
    considered
    the
    impact
    on
    our
    users
    and
    how
    a
    move
    towards
    zero
    trust
    security
    can
    vastly
    improve
    the
    user
    experience?


    • How
      to
      cultivate:

      Remember
      a
      very
      simple
      yet
      essential
      concept.
      Whatever
      our
      role
      in
      the
      organization,
      we’re
      all
      users.
      The
      easier
      we
      make
      security
      controls

      in
      other
      words,
      the
      less
      they
      get
      in
      the
      way
      of
      getting
      our
      work
      done,
      the
      better
      for
      all
      of
      us.



Next
Steps


  • Listen

    to
    the

    conversation

    Wolfgang
    Goerlich,
    Advisory
    CISO,
    and
    I
    had
    during
    this
    on-demand
    webinar
    entitled
    “The
    Skeptic
    and
    the
    Data:
    How
    to
    Build
    Trust
    for
    Zero
    Trust”.

  • Explore

    Cisco’s

    rollout

    of
    zero
    trust
    using
    Duo
    for
    our
    100,000+
    users
    in
    more
    than
    95
    countries.

  • Download

    Cisco’s

    Guide

    to
    Zero
    Trust
    Maturity
    to
    see
    how
    teams
    with
    mature
    implementations
    of
    zero
    trust
    found
    quick
    wins
    and
    built
    organizational
    trust.


We’d
love
to
hear
what
you
think.
Ask
a
Question,
Comment
Below,
and
Stay
Connected
with
Cisco
Secure
on
social!


Cisco
Secure
Social
Channels



Instagram



Facebook



Twitter



LinkedIn

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.