Build a Zero Trust Roadmap

Leverage an iterative and repeatable process to apply zero trust to your organization.

Onsite Workshop

Not using zero trust at the organization results in:

  • Lack of visibility into how transaction flows map to critical and vulnerable assets and where to best implement security controls.
  • A potentially weaker security posture across the digital attack surface.

A formalized zero trust strategy using Info-Tech’s methodology results in:

  • A mapping of transaction flows of critical and vulnerable assets and visibility into where to implement security controls that align with the principle of zero trust.
  • Improved security posture across the digital attack surface while focusing on the protect surface.
  • An inside-out architecture that leverages current existing architecture to tighten security controls that is automated and gives granular visibility.

Module 1: Define Business Goals and Protect Surfaces

The Purpose

Align business goals to protect surfaces.

Key Benefits Achieved

A better understanding of how business goals can map to key protect surfaces and their associated DAAS elements.

Activities: Outputs:
1.1 Understand business and IT strategy and plans.
1.2 Define business goals.
1.3 Identify five critical protect surfaces and their associated DAAS elements.
1.4 Map business goals and protect surfaces.
  • Mapping of business goals to key protect surfaces and their associated DAAS elements.

Module 2: Begin Gap Analysis

The Purpose

Identify and define zero trust initiatives.

Key Benefits Achieved

A list of zero trust initiatives to be prioritized and set into a roadmap.

Activities: Outputs:
2.1 Assess current security capabilities and define the zero trust target state for a set of controls.
  • Security capabilities current state assessment
  • Zero trust target state
2.2 Identify tasks to close maturity gaps.
  • Tasks to address maturity gaps
2.3 Assign tasks to zero trust initiatives.

Module 3: Complete Gap Analysis

The Purpose

Complete the zero trust gap analysis and prioritize zero trust initiatives.

Key Benefits Achieved

A prioritized list of zero trust initiatives aligned to business goals and key protect surfaces.

Activities: Outputs:
3.1 Align initiatives to business goals and key protect surfaces.
  • Zero trust initiative list mapped to business goals and key protect surfaces
3.2 Conduct cost/benefit analysis on zero trust initiatives.
3.3 Prioritize initiatives.
  • Prioritization of zero trust initiatives

Module 4: Finalize Roadmap and Formulate Policies

The Purpose

Finalize the zero trust roadmap and begin to formulate zero trust policies for roadmap initiatives.

Key Benefits Achieved

A zero trust roadmap of prioritized initiatives.

Activities: Outputs:
4.1 Define solution criteria.
4.2 Identify candidate solutions.
4.3 Evaluate candidate solutions.
4.4 Finalize roadmap.
  • Zero trust roadmap
4.5 Formulate policies for critical DAAS elements.
  • Zero trust policies for critical protect surfaces
  • Method for defining zero trust policies for candidate solutions
4.6 Establish metrics for high-priority initiatives.
  • Metrics for high-priority initiatives

Workshop icon Book Your Workshop

Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.

Book a Workshop View Blueprint
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us