Chapter 12. Challenges and the Road Ahead
In this concluding chapter, you will learn about the challenges commonly encountered when implementing zero trust initiatives, as well as the impact of new technological developments, such as quantum computing, artificial intelligence, and privacy-enhancing technologies. The goal is to provide a high-level view of the technical and functional challenges associated with zero trust initiatives in a vendor-neutral manner, as well as to discuss emerging technologies that will ultimately impact both zero trust and organizations’ broader cybersecurity efforts.
Challenges
This section discusses the common challenges encountered during the implementation of a zero trust initiative and provides a few recommendations for dealing with them. As you delve into the subject matter, it becomes evident that the challenges include not only technical factors but also functional issues, requiring potential cultural and process-level improvements.
Mindset Shift
Implementing a zero trust initiative requires a paradigm shift in security philosophy. It necessitates a shift away from traditional perimeter-based security to an “always assume breach” mindset. However, when dealing with a large organization with a decade of legacy IT architecture and practices, the implementation of zero trust principles turns out to be challenging.
For most organizations, the zero trust initiative is a new endeavor that requires full backing and buy-in from the executive leadership. ...
Get Zero Trust Networks, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.