Issues with zero-trust implementations

Fortinet Australia Pty Ltd

Monday, 17 January, 2022


Issues with zero-trust implementations

A new survey reveals that while most organisations have a vision of zero trust or are in the process of implementing zero-trust initiatives, more than half cannot translate this vision into the solutions they are implementing because they lack some basic core fundamentals.

Organisations struggle to consistently authenticate users and devices

The Global State of Zero Trust report from Fortinet draws detail from a global survey of IT decision-makers across all industries, including the public sector.

According to the company’s EVP of products and CMO, John Maddison, many organisations are falling well short of a holistic strategy, despite zero trust being a priority.

“With the evolving threat landscape, transition to work-from-anywhere and the need to securely manage applications in the cloud, the shift from implicit trust to zero trust is top of mind for organisations.

“Our survey shows while most organisations have some form of a zero-trust strategy in place, they fall short of a holistic strategy and struggle to implement some core zero-trust security basics. An effective solution requires a cybersecurity mesh platform approach to address all zero-trust fundamentals across the infrastructure, including endpoint, cloud and on-premises, otherwise the result is a partial, non-integrated solution that lacks broad visibility,” he said.

A FortiGuard Labs Threat Landscape report demonstrated an increase in the volume and sophistication of attacks targeting individuals, organisations and increasingly, critical infrastructure. Organisations are looking for solutions to protect against these evolving threats and zero trust is top of mind, but for multiple reasons. Additionally, the shift to work-from-anywhere has put a spotlight on zero-trust network access (ZTNA) in particular, as organisations need to protect important assets from workers connecting from poorly protected home networks.

Confusion over defining zero-trust strategies

The report illustrates some confusion about what comprises a complete zero-trust strategy. Respondents indicated they understand zero trust (77%) and ZTNA (75%) concepts and over 80% reported already having a zero-trust and/or ZTNA strategy in place or development. Yet, over 50% indicated being unable to implement core zero-trust capabilities. Nearly 60% indicated they do not have the ability to authenticate users and devices on an ongoing basis and 54% struggle to monitor users post-authentication.

This gap is concerning because these functions are critical tenets of zero-trust and it brings into question what the actual reality of these implementations is across organisations. Adding to the confusion are the terms “Zero Trust Access” and “Zero Trust Network Access”, which are used sometimes interchangeably.

Zero trust is top of mind and priorities are varied

Priorities for zero trust are “minimising the impact of breaches and intrusions” followed closely by “securing remote access” and “ensuring business or mission continuity.” “Improving user experiences” and “gaining flexibility to provide security anywhere” were also top priorities.

“Security across the entire digital attack surface” was the single most important benefit cited by respondents, followed by a “better user experience for remote work (VPN)”.

A vast majority of the survey respondents believe that it is vital for zero-trust security solutions to be integrated with their existing infrastructure, work across cloud and on-premises environments, and be secure at the application layer. However, more than 80% of respondents indicated that it is challenging to implement a zero-trust strategy across an extended network. For organisations without a strategy in place or development, obstacles included a lack of skilled resources with 35% of organisations using other IT strategies to address zero trust.

Image credit: ©stock.adobe.com/au/Olivier Le Moal

Related Articles

Storage strategy in the multicloud era

Data has become the essential raw material in the strategic orientation of business, making data...

Private AI models: redefining data privacy and customisation

Private AI signifies a critical step forward towards a more secure, personalised and efficient...

Why having an observability strategy is critical for effective AI adoption

As organisations continue to adopt AI and put it to work in a variety of innovative ways, many...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd