Despite all the marketing hype related to ZTA, at the end of the day, it may not make sense for all organizations, particularly those in less risky environments to implement or pursue all components. That said, all organizations can learn from the tenets and leverage them to improve their security posture. In the preceding series, we have attempted to provide both conceptual definitions and practical steps to implement ZTA-related security policies and controls. To summarize the series, here is a one-page graphic intended to serve as a TL;DR of the entire series:
Have questions about zero trust? RH-ISAC’s Member Exchange is the home for discussions among retail and hospitality peers. Not a member? Learn how becoming a part of the RH-ISAC community could benefit you.