Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecurityCybersecurity News

Leverage the zero trust architecture model to grow your business

By Edward Tuorinsky, Derek Kernus
zero-trust-freepik1170x658v47.jpg

Image by Freepik

January 10, 2023

There are plenty of good reasons why companies should implement cybersecurity, but today we’re focusing on growth. Your business is likely already looking at different approaches and options for more robust security. The options may all sound good. However, it’s the price tags that have many hitting the pause button. Now there’s a way to look at the Return on Investment (ROI) for cybersecurity, and it leverages a free model that also helps with business growth.

In 2021, the Cybersecurity and Infrastructure Security Agency (CISA) released its Cloud Security Technical Reference Architecture and Zero Trust Maturity Model for Zero Trust Architecture (ZTA), the tenants of which have been mandated within the federal space as NIST SP 800-207. This is progressive guidance for the federal government, which normally lags behind private industry. So, coming out with a free model is worth taking note of, particularly because in business, ZTA offers a competitive advantage that can directly lead to growth.

 

Laying the foundations of Zero Trust Architecture 

CISA’s model was designed as a roadmap to assist government agencies as they implement more rigorous cybersecurity—but the approach, and the guidelines, are free and can be used by any organization.

ZTA follows the philosophy of never trusting a device, source, or user—always verifying. The model uses least privilege per-request access decisions for information systems and services, requiring all users to be authenticated, authorized, and continuously validated before being given access to applications and data.

ZTA has caused a lot of buzz. At the end of the day, it’s a concept, not a plan of action. What IS valuable is that it’s a crawl-walk-run mindset. Organizations make iterative changes, investing in controls over time. For those worried about change and costs, ZTA feels like a more comfortable pace to adapt and evolve.

Importantly, for our growth-minded purposes, ZTA helps align cybersecurity to your organization’s structure and business goals. You really need to understand how your business operates, in order to implement ZTA properly. And anytime you're working on business processes becomes an opportunity for business growth.

 

Business growth in the age of cybersecurity

From a business standpoint, all data is not created equal. The general information found on your website, for example, doesn’t need to be protected with the same controls as client data, employee personally identifiable information (PII), engineering plans, or proprietary formulas. ZTA understands this and uses the most protective (and most expensive) controls where it matters. The result is an initial cost saving that keeps necessary cybersecurity within reach and affordable for most companies.

ZTA also recognizes that thinking things through and implementing security correctly right from the get-go saves money and that protection is far cheaper than the clean-up following a breach. Through our experience, we know that investments in security reduce risk, and that can translate to saving on cyber insurance and business insurance. We also know that the process of thinking through ZTA logic helps drive transformation and modernization that many companies need to compete in an evolved marketplace that goes well beyond cybersecurity.

Many will recognize that the business moves involved with ZTA are the very same ones needed for company growth. And with ZTA and cybersecurity well in hand, you’ll enjoy a competitive advantage over those in the industry who continue to delay or have already experienced a cybersecurity incident.  We believe that business will soon involve disclosing your system security plan, a SOC 2 Type 2 report, a compliance score, or a 3rd party certification verifying compliance against a given framework to vendors and other stakeholders. Once again, being an early adopter will be an advantage.

 

Implementing Zero Trust Architecture

Implementing ZTA involves answering some thorny questions.

The first question is, “What are you trying to protect?” Getting the answer is an exercise along the lines of putting together a business or strategic plan for your organization or your division. You’ll need to identify the sensitive data areas and related workflows. If your organization hasn't been actively looking at and labeling its data assets, this can be a challenging hurdle. 

Once you’ve identified what needs to be protected, ask yourself, “How do we want to protect it?” and “What are the requirements we want in place to access this data and these workloads?” That’s an easier task and with those answers in hand, you’ll be ready to look at tools or solutions.

Companies tend to want to jump ahead, past the strategic parts of ZTA. Don’t be swayed by marketing or tempted by a sales pitch. You’ll—need to put in the work to understand your situation and security needs before you can truly evaluate potential security solutions.

Of course, it’s tempting to turn the whole project over to a software solution that says it's ZTA compliant. The risk is that you’ll get a cookie-cutter solution that doesn’t fit your structure or culture and therefore is difficult to implement and maintain. The challenge is not technical but rather cultural—it’s your employees who will need to follow the policies and training, and respond to security incidents—so it needs to fit just right.

There’s a final question for ZTA which is “What’s our budget?” It’s maybe the thorniest question because money is always a consideration. ZTA offers some flexibility regarding spending during the planning stages. Since you’ve already prioritized the data that needs to be protected and determined how you want to protect it, you may not have to spend a huge amount all at once to get everything done immediately. A good ZTA implementation strategy allows you to plan ahead and build up your security profile over a span of time, making it more affordable. Of course, ZTA is also iterative. As soon as you implement new security controls, you should reevaluate your profile and plan to enhance again.

ZTA success comes down to your risk tolerance. What level of risk are you willing to accept? Realizing the business benefits of ZTA can boost your ROI. So, what’s at risk, you ask? The confidence and trust of your employees and customers. If you choose to move slowly and therefore experience a breach, you’ll have to justify not having proper security to all of your shareholders. On the other hand, if you move forward quickly, you’ll be able to talk to stakeholders about your brand’s commitment to data protection.

 

A final word of advice on ZTA

Regardless of the model you follow, cybersecurity is about policy; it’s about procedure; it’s about people; in addition, of course, to technology. It is time-consuming and expensive. It only makes sense to make a good business plan to execute it. At our critical moment in time, when new attacks and increasingly sophisticated schemes crop up every day, it’s critically important to get started. Knowledge about implementing ZTA is available from the government for free. Use this resource to protect what’s valuable and grow the business you have.

KEYWORDS: cyber security risk management zero trust

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ed tuorinsky headshot

Edward Tuorinsky, Founder and Managing Principal of DTS, a government and commercial consultant business, is a Service-Disabled Veteran with nearly two decades of experience in management consulting and information technology services. Image courtesy of Tuorinsky

Derekkernus

Derek Kernus is the director of cybersecurity operations at DTS and holds CISSP, CCSP and CMMC RP certifications.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-security-freepik45.jpg

    CISA releases the cloud security technical reference architecture and zero trust maturity model for public comment

    See More
  • Growing and Gaining

    Want to Avoid Being Scapegoated For the Next Breach? You Need Total Trust Alongside Zero Trust

    See More
  • cyber5-900px.jpg

    Four Ways to Achieve a Zero Trust Security Model

    See More

Related Products

See More Products
  • databasehacker

    The Database Hacker's Handboo

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!