Originally Posted: October 31, 2023 | By: Julian Durand

The zero trust architecture network (ZTNA) cybersecurity approach has gained significant attention in recent years amid the rapid growth of digital systems and increasingly sophisticated cyber threats. However, successfully implementing ZTNA can be challenging, particularly when integrating devices that are old or have low storage or computing capacity.

I previously discussed the National Institute of Standards and Technology (NIST)’s security approach that meets tomorrow’s challenges by leveraging practices like least privilege access, microsegmentation and verification of every access request.

While this may have resonated with many, others may have been left thinking, “That’s great, but it may be too demanding of an undertaking for my organization.” This feeling may be particularly pronounced at companies that have been around awhile and have accumulated significant legacy architecture.

In this article, I’ll discuss ideas for implementing a standard-based ZTNA on a practical level, focusing on the concept of incremental adoption and the need for system-level security. More specifically, I’ll examine how this approach can address a range of challenges and fortify against a new, more sophisticated generation of threats.

 

To read the full article on Forbes, click here.