Do you have all the parts of zero trust in place to control risk to your crown jewels?
If you don't know where to start, you probably need to assess your situation.
Using a zero trust readiness assessment you can see what parts of the people, process, and technology triad you already have in place and what you don't. With a readiness assessment you can figure out what to focus on first in order to tackle the remaining parts of the zero trust jigsaw.
Zero trust is a model or philosophy of how users and devices access applications and data. Zero trust is not a SKU or a single product, rather it is a more secure way to provide access to data by checking the identity of the user, or application, on a continual basis before allowing the user or application to access sensitive or confidential data, limiting access by network segmentation and dynamic access mechanisms.
Remember, the goal is to protect the data and make sure that it remains confidential, maintains integrity and availability.
CBTS used the NIST Special Publication 800-207 as the foundation for an assessment to help customers know where they stand with their zero trust journey. The assessment is standards based and does not reference or promote vendor solutions, rather the people, processes, and technologies in place are assessed against 800-207. In this presentation we will review the general components of a zero trust readiness assessment so that you know where you are and how to complete your journey.