David Crawford, CGI Federal

David Crawford

Director

When the Cybersecurity and Infrastructure Security Agency (CISA) introduced their Zero Trust Maturity Model (ZTMM), it emphasized the importance of the five pillars: Identity, Device, Network, Application, and Data. These pillars form the foundation of a robust Zero Trust architecture. However, there are additional capabilities that cut across these pillars, enabling organizations to achieve optimal Zero Trust maturity.

In this blog post, we will explore these three cross-pillar capabilities: Visibility and Analytics, Automation and Orchestration, and Governance.

  • Visibility and Analytics 

To effectively implement Zero Trust, organizations must have full visibility into their users, devices, networks, applications, and data. This capability involves continuous monitoring and analysis of network traffic, user behavior, and system logs to detect and respond to potential threats in real time.  Enhanced visibility enables security teams to gain comprehensive insights into their environment, enabling informed decision-making and rapid incident response.

  • Automation and Orchestration 

Automation and orchestration play a crucial role in Zero Trust architecture by streamlining security processes and reducing manual intervention. With the increasing volume and complexity of security threats, manual tasks become inefficient and time-consuming. By automating routine security tasks such as access control, vulnerability scanning, systems hardening, and incident response, organizations can free up valuable resources, reduce technical debt, and improve overall efficiency. Additionally, orchestration enables the integration and coordination of security tools and systems, ensuring a synchronized response to security incidents and facilitating seamless communication between different security components.

  • Governance 

Governance is a fundamental aspect of Zero Trust implementation, providing the framework for policies, procedures, and controls that guide security practices. It involves establishing clear roles and responsibilities, defining access privileges, and enforcing compliance with security standards. Effective governance ensures that security measures are consistently applied across the organization, reducing the risk of unauthorized access and data breaches. It also promotes accountability, transparency, and continuous improvement in security practices.  Governance must be core, “baked in”, rather than “bolted on”. 

By incorporating these critical cross-cutting capabilities of Visibility and Analytics, Automation and Orchestration, and Governance, organizations can enhance the effectiveness of their Zero Trust architecture. These capabilities act as the glue that binds the five pillars together, enabling organizations to achieve optimal Zero Trust maturity over time. Embracing advanced visibility and analytics, leveraging automation and orchestration, and implementing robust governance practices will empower organizations to stay one step ahead of evolving threats and ensure the highest level of security for their networks, applications, and data.  

It is often the case that just knowing where to start can be challenging, in terms of incorporating the cross-cutting capabilities.  While governance is important, incorporation of full visibility in the environment will result in improvements in maturity in all the pillars. The data provided by increased visibility will be key to driving automated decision making throughout the environment. Our recommendation is to close visibility gaps as each pillar is worked on, as a foundational activity. This will help in improving maturity as a whole.

About this author

David Crawford, CGI Federal

David Crawford

Director

David Crawford is a lead cyber architect in the National Security and Justice business unit at CGI Federal.