Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

4 stages of a zero trust self-assessment

By Matt Graves
Zero-trust-freepik
October 20, 2021

You want to begin implementing zero trust security at your organization, but where do you start? 


Fortunately, because zero trust security isn’t provided by a single solution or product but is instead an ongoing methodology, your organization may already have some of the pieces in place to adopt a zero-trust stance. And if not, there are clear stages detailed in this article to build a zero-trust framework that serves as the roadmap for your organization’s journey to better security and greater efficiency. 


It all starts with identity.


Stage 0: Fragmented Identity


Most organizations exist in this pre-zero trust stage not because they’ve ignored security concerns but because Microsoft’s Active Directory has been the default enterprise directory service for the past two decades, used by administrators everywhere to manage permissions and access to network resources.


This kind of directory worked exceptionally well in an enterprise that uses a traditional perimeter-based security system, with a wall around a local network where employees are at their desks, log into their workstation, and subsequently have access to all the files, applications and data they need on the network. In that kind of system, the assumption is that you’re trusted if you have the password and are inside the network.


Today, however, we use cloud-based applications and data storage with their own logins. Users access resources from a wide variety of endpoints, whether they’re working remotely or simply using a mobile device as part of their work. Malicious actors have developed sophisticated methods that render traditional password protection ineffective. Password fatigue across applications and a lack of employee security awareness have led to people using easy-to-crack passwords, reusing the same password across multiple accounts, and emailing co-workers the password to access a resource or application.


Today’s environment lends itself to the rise of the zero trust model. It assumes that external and internal threats exist at all times and that simply being local on the network isn’t enough to trust that user or device. So, zero trust relies on identity, and continuous verification of that identity, for permissions and access across all network resources. Identity management and continuous verification require a unified user directory across all applications.


Stage 1: Unified Identity and Access Management

If you have a unified identity and access management (IAM) system in place, then you already have the foundation on which to build a zero-trust environment. When we talk about identity as the foundation for zero trust, we’re talking about three key pieces of knowledge: Who are your users? What do your users access? What are they doing with that access?


IAM reduces potential attack points for malicious actors by consolidating all users into a central directory. Now you know every user who has access to the system, what they have access to and when they’re using it. A unified system with a single sign-on (SSO) also eliminates the issue of users having different logins for Active Directory and applications like SalesForce, Trello, BambooHR, and other cloud-based applications. Signing in once and having all appropriate access available not only makes managing security easier, but it’s a relief for users and makes it easier for them to do their jobs.


Another common occurrence ameliorated by a unified IAM is mergers and acquisitions. When companies merge, the IT department is suddenly faced with two separate directories, which can become an unwieldy organizational barrier to security and general operations alike. Integrating into a single directory takes a lot of time, and managing two domains can become a black hole for your IT team. With a unified IAM, you have multiple options on how to manage this scenario while keeping in place the security needed to protect your assets.


Finally, your IAM system will allow you to deploy multi-factor authentication (MFA). Whether you choose to use push notification, SMS notification, a one-time phone call, or another option, you can add this extra layer of authentication whenever the system flags an access request or action. 


Stage 2: Contextual Access and Automated Provisioning 


Policies that track behavior and detect changes that call for MFA are the next stage of building a zero-trust environment. For instance, a user based in Chicago logs in from Los Angeles. In a traditional perimeter-based system, this wouldn’t matter, and the login would continue unabated. But with a zero-trust system, the change in context is something that would be covered by a policy created specifically to meet your organizational needs.


If this is a user who regularly travels for work, maybe you have a policy that doesn’t trigger MFA for this scenario. Or you can choose to have that extra authentication, to be doubly sure. Velocity matters, too. If that user logged in from Chicago that morning, but the login from Los Angeles only happens a few hours later, that can be flagged as suspicious and require MFA.


Related to this contextual access is automated provisioning and de-provisioning, made possible through your unified IAM and the policies you create. If a user account is created for a new hire in the sales department, your system can provide the least privileged access needed for their first day on the job — their email account, appropriate files and folders, and applications shared by members of that department.


If the user moves to another department, that change will deprovision their access to the sales folders and applications and add the appropriate access to their new department. Finally, an employee who leaves the organization can have all access revoked without losing the important data and history attached to that account. 


Stage 3: Adaptive Workforce


Although considered the final stage of zero trust, it’s important to remember that zero trust is not a goal that, once achieved, exists in perpetuity. Zero trust is an ongoing methodology. New efficiencies, like passwordless authentication, become available often as technology advances. With a solid foundation in place, your zero trust architecture can adapt and evolve to incorporate any new technology. And with your foundation set, risk-based access policies and continuous, adaptive authentication can be implemented.


Say a user logs into their ADP account at 11 o’clock at night. That may be a usual occurrence and something your policy identifies as a low-risk factor. But if that same user is trying to access a financial app late at night from outside the office, your risk-based policies can set up your system to trigger MFA or block access completely.


The adaptive part here is that the system continues to monitor the user’s behavior and context. Based on a set level of risk tolerance, another authentication request can be triggered based on changes in one of those signals — whether accessing a certain folder, application, a change in location, and so forth. Reauthentication can again be required based on changing behaviors and context even if a user logs in and passes an MFA check.


While this sounds limiting, with a smart system and well-defined policies in place, zero trust can actually simplify the user experience. Having the policies and monitoring properly deployed and constantly running behind the scenes means that users will have fewer passwords to manage and gain a more customized security experience built on how they work most effectively.


Stronger and Simpler


Zero trust is quickly becoming the default security stance because of our increasingly interconnected world, where remote work, multiple devices and cloud-based applications and resources are all far more common than before. Yet, in striving to find a better security framework, zero trust has actually created a way to simplify security for your organization, simplify your users’ experience, and ultimately boost efficiency across organizations.

KEYWORDS: cyber security information security risk management zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Matt Graves is the VP of the information security practice at MajorKey Technologies.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • zero trust-freepik1170x658v59703.png

    The fundamentals of implementing a zero trust security policy

    See More
  • digital Trust freepik

    Zero Trust, a core component of any modern security strategy

    See More
  • biometrics-freepik1170x658v8502.jpg

    Biometrics as a foundation of zero trust: How do we get there?

    See More

Events

View AllSubmit An Event
  • August 27, 2025

    Risk Mitigation as a Competitive Edge

    In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!