Build a Zero Trust Roadmap
Leverage an iterative and repeatable process to apply zero trust to your organization.
Book This WorkshopNot using zero trust at the organization results in:
- Lack of visibility into how transaction flows map to critical and vulnerable assets and where to best implement security controls.
- A potentially weaker security posture across the digital attack surface.
A formalized zero trust strategy using Info-Tech’s methodology results in:
- A mapping of transaction flows of critical and vulnerable assets and visibility into where to implement security controls that align with the principle of zero trust.
- Improved security posture across the digital attack surface while focusing on the protect surface.
- An inside-out architecture that leverages current existing architecture to tighten security controls that is automated and gives granular visibility.
Book Your Workshop
Onsite Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn’t enough, we offer low-cost onsite delivery of our Project Workshops. We take you through every phase of your project and ensure that you have a road map in place to complete your project successfully.
Book NowModule 1: Define business goals and protect surfaces
The Purpose
Align business goals to protect surfaces.
Key Benefits Achieved
A better understanding of how business goals can map to key protect surfaces and their associated DAAS elements.
Activities: | Outputs: | |
---|---|---|
1.1 | Understand business and IT strategy plans. |
|
1.2 | Define business goals. |
|
1.3 | Identify five critical protect surfaces and their associated DAAS elements. |
|
1.4 | Map business goals and protect surfaces. |
|
Module 2: Begin gap analysis
The Purpose
Identify and define zero trust initiatives.
Key Benefits Achieved
A list of zero trust initiatives to be prioritized and set into a roadmap.
Activities: | Outputs: | |
---|---|---|
2.1 | Assess current security capabilities and define the zero trust target state for a set of controls. |
|
2.2 | Identify tasks to close maturity gaps. |
|
2.3 | Assign tasks to zero trust initiatives. |
|
Module 3: Complete gap analysis
The Purpose
Complete the zero trust gap analysis and prioritize zero trust initiatives.
Key Benefits Achieved
A prioritized list of zero trust initiatives aligned to business goals and key protect surfaces.
Activities: | Outputs: | |
---|---|---|
3.1 | Align initiatives to business goals and key protect surfaces. |
|
3.2 | Conduct cost/benefit analysis on zero trust initiatives. |
|
3.3 | Prioritize initiatives. |
|
Module 4: Formulate policies and finalize roadmap
The Purpose
Finalize the zero trust roadmap and begin to formulate zero trust policies for roadmap initiatives.
Key Benefits Achieved
A zero trust roadmap of prioritized initiatives.
Activities: | Outputs: | |
---|---|---|
4.1 | Define solution criteria. |
|
4.2 | Identify candidate solutions. |
|
4.3 | Evaluate candidate solutions. |
|
4.4 | Finalize roadmap. |
|
4.5 | Formulate policies for critical DAAS elements. |
|
4.6 | Establish metrics for high-priority initiatives. |
|