{"id":15168,"date":"2023-12-04T14:46:18","date_gmt":"2023-12-04T19:46:18","guid":{"rendered":"https:\/\/tsisupport.com\/tsistaging\/?p=15168"},"modified":"2023-12-11T10:07:55","modified_gmt":"2023-12-11T15:07:55","slug":"zero-trust-article-4-10-23","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=15168","title":{"rendered":"Do You Need a Zero-Trust Architecture for NIST 800-171 &#038; CMMC?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Zero trust is a security model that assumes that a network or system is not inherently secure, and that all users, devices, and applications should be authenticated and authorized before being granted access to resources. This means that no device or user is trusted by default, and that access control is strictly enforced based on policies and rules.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Zero trust is an approach to security that can be applied to a wide range of systems, including cloud infrastructure, networks, and applications. It is designed to reduce the risk of data breaches and other security incidents by minimizing the attack surface and limiting the ability of attackers to move laterally within a system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Cybersecurity Maturity Model Certification (CMMC) is a framework that was developed by the U.S. Department of Defense (DoD) to help protect the confidentiality of sensitive data, including Controlled Unclassified Information (CUI), which is information that is not classified but is still sensitive and requires protection. The CMMC framework includes five levels of certification, each of which requires an organization to demonstrate a certain level of cybersecurity maturity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Zero trust is a key component of the CMMC framework, particularly at the higher levels of certification. To achieve higher levels of certification, an organization must implement a zero trust security model that includes strong authentication and access control policies, as well as monitoring and response capabilities that can quickly detect and respond to security incidents. By adopting a zero trust approach, organizations can better protect their sensitive data and meet the requirements of the CMMC framework.<\/span><\/p>\n<h4><b>The Justification for Zero-Trust Model<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">A zero trust model is needed because traditional security models that rely on perimeter defenses and trust assumptions are no longer sufficient to protect against modern cyber threats. In the past, organizations would typically focus on securing their network perimeter, assuming that anything inside the perimeter was safe and trusted. However, as more organizations have moved to cloud-based systems and mobile devices, this model has become outdated.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem with traditional security models is that they assume that devices and users within the network are trusted, and therefore do not need to be authenticated or authorized. However, in today&#8217;s threat landscape, attackers can easily exploit vulnerabilities or gain access through phishing attacks, social engineering, or other means. Once inside the network, they can move laterally and access sensitive data, even if that data is behind additional layers of security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A zero trust model, on the other hand, assumes that no device or user is trusted by default, and that access must be strictly controlled based on policies and rules. This means that all users, devices, and applications must be authenticated and authorized before they are granted access to resources, and that access control is enforced at every level of the network. By implementing a zero trust model, organizations can reduce the risk of data breaches and other security incidents, even in the face of sophisticated and persistent attackers.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><b>The \u201cHidden Costs\u201d of the Zero-Trust Security Model<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The cost of implementing a zero trust model can vary depending on a number of factors, including the size and complexity of the organization, the existing security infrastructure, and the level of security required. However, there are some general costs that organizations should consider when planning to implement a zero trust model.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Firstly, there may be costs associated with upgrading or replacing existing security infrastructure to support a zero trust model. This may include investing in new hardware or software, such as identity and access management (IAM) solutions, multi-factor authentication (MFA), and network segmentation tools.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Secondly, there may be costs associated with employee training and awareness. In order to effectively implement a zero trust model, employees will need to be educated about the new security policies and procedures, and may require training on how to use new security tools and technologies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thirdly, there may be ongoing costs associated with monitoring and maintaining a zero trust environment. This may include investing in security operations center (SOC) capabilities, such as threat detection and response, as well as regular security assessments and testing to ensure that the zero trust model is effective and up-to-date.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, it&#8217;s important to note that the cost of not implementing a zero trust model can be much higher in the long run, as the potential costs of a data breach or security incident can far outweigh the costs of implementing and maintaining a robust zero trust model.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><b>Zero Trust Model\u2019s \u201cGotchyas\u201d and Considerations to Keep In Mind<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">While a zero trust model can be an effective way to improve security and reduce the risk of data breaches, there are also some potential negatives to consider:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Complexity: A zero trust model can be complex to implement and manage, particularly for organizations with large and complex IT environments. It may require significant changes to existing security infrastructure and processes, as well as ongoing monitoring and maintenance to ensure that security policies and controls are up-to-date.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cost: As I mentioned earlier, implementing a zero trust model can involve significant costs, including investments in new security hardware, software, and personnel. This can be a challenge for organizations with limited budgets or resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">User Experience: A zero trust model can potentially increase friction for end-users, as they will need to go through additional authentication and authorization steps to access resources. This can be a trade-off between security and user convenience, and may require careful consideration of user experience design and usability testing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Potential for False Positives: Zero trust models rely on continuous monitoring and analysis of network traffic to detect and prevent security incidents. However, this can also lead to false positives, where legitimate traffic is blocked or flagged as suspicious. This can lead to user frustration and productivity loss, and requires careful tuning of security policies and controls to balance security with usability.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overall, while a zero trust model can be an effective way to improve security, it is important to consider the potential negatives and carefully evaluate the costs and benefits before implementing this approach.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><b>So, Do You Actually Need a Zero Trust Model?<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Determining if you need a zero trust model requires a careful assessment of your organization&#8217;s security risks, threats, and vulnerabilities, as well as your existing security infrastructure and policies. Here are some key factors to consider:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regulatory Compliance: If your organization is subject to regulatory compliance requirements, such as HIPAA, PCI-DSS, or the Cybersecurity Maturity Model Certification (CMMC), you may be required to implement a zero trust model to meet these requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sensitive Data: If your organization handles sensitive data, such as personally identifiable information (PII), financial data, or intellectual property, a zero trust model can help reduce the risk of data breaches and other security incidents.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Threat Landscape: If your organization operates in a high-risk industry or is frequently targeted by cyber attackers, a zero trust model can help reduce the risk of successful attacks by minimizing the attack surface and limiting lateral movement.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud Adoption: If your organization is adopting cloud-based systems and services, a zero trust model can help ensure that all users, devices, and applications are properly authenticated and authorized, regardless of their location or network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mergers and Acquisitions: If your organization has undergone mergers and acquisitions, a zero trust model can help ensure that all new systems and users are properly authenticated and authorized before being granted access to sensitive resources.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Risk Assessment: Conducting a thorough risk assessment can help identify potential security risks and vulnerabilities, and determine whether a zero trust model is necessary to mitigate these risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Overall, the decision to implement a zero trust model should be based on a careful assessment of your organization&#8217;s security risks and requirements, and should be evaluated on a case-by-case basis. It&#8217;s important to work with experienced security professionals to ensure that your security approach is tailored to your specific needs and risks.<\/span><\/p>\n<p><a href=\"https:\/\/tsisupport.com\/contact\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-15092 size-large\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/09\/Apple-Notification-2-1024x551.png\" alt=\"Holiday Shopping Cybersecurity\" width=\"1024\" height=\"551\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/09\/Apple-Notification-2-1024x551.png 1024w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/09\/Apple-Notification-2-300x161.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/09\/Apple-Notification-2-768x413.png 768w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/09\/Apple-Notification-2-1536x827.png 1536w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/09\/Apple-Notification-2-2048x1102.png 2048w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/09\/Apple-Notification-2.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zero trust is a security model that assumes that a network or system is not inherently secure, and that all users, devices, and applications should be authenticated and authorized before being granted access to resources. This means that no device or user is trusted by default, and that access control is strictly enforced based on&hellip;<\/p>\n","protected":false},"author":4,"featured_media":15171,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comprehensive Holiday Shopping Cybersecurity Guide<\/title>\n<meta name=\"description\" content=\"% Stay safe while shopping online and in-person during the holidays with this comprehensive cybersecurity guide. Protect your personal and financial information from cyber threats\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comprehensive Holiday Shopping Cybersecurity Guide\" \/>\n<meta property=\"og:description\" content=\"% Stay safe while shopping online and in-person during the holidays with this comprehensive cybersecurity guide. Protect your personal and financial information from cyber threats\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=15168\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-04T19:46:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-11T15:07:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/12\/Happy-holowwen-1024x551.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"551\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Chris Souza\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chris Souza\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=15168\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=15168\",\"name\":\"Comprehensive Holiday Shopping Cybersecurity Guide\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=15168#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=15168#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/12\/Happy-holowwen.png\",\"datePublished\":\"2023-12-04T19:46:18+00:00\",\"dateModified\":\"2023-12-11T15:07:55+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/91ba4bc98e1a6b903424252af609a9ed\"},\"description\":\"% Stay safe while shopping online and in-person during the holidays with this comprehensive cybersecurity guide. Protect your personal and financial information from cyber threats\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=15168#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=15168\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=15168#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/12\/Happy-holowwen.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/12\/Happy-holowwen.png\",\"width\":6813,\"height\":3669},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=15168#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Do You Need a Zero-Trust Architecture for NIST 800-171 &#038; CMMC?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/91ba4bc98e1a6b903424252af609a9ed\",\"name\":\"Chris Souza\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d9e77a32df062fd4d46c61b29b00f1be?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d9e77a32df062fd4d46c61b29b00f1be?s=96&d=mm&r=g\",\"caption\":\"Chris Souza\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=4\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comprehensive Holiday Shopping Cybersecurity Guide","description":"% Stay safe while shopping online and in-person during the holidays with this comprehensive cybersecurity guide. Protect your personal and financial information from cyber threats","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Comprehensive Holiday Shopping Cybersecurity Guide","og_description":"% Stay safe while shopping online and in-person during the holidays with this comprehensive cybersecurity guide. Protect your personal and financial information from cyber threats","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=15168","og_site_name":"TSI Support","article_published_time":"2023-12-04T19:46:18+00:00","article_modified_time":"2023-12-11T15:07:55+00:00","og_image":[{"width":1024,"height":551,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/12\/Happy-holowwen-1024x551.png","type":"image\/png"}],"author":"Chris Souza","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Chris Souza","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=15168","url":"https:\/\/tsisupport.com\/tsistaging\/?p=15168","name":"Comprehensive Holiday Shopping Cybersecurity Guide","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=15168#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=15168#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/12\/Happy-holowwen.png","datePublished":"2023-12-04T19:46:18+00:00","dateModified":"2023-12-11T15:07:55+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/91ba4bc98e1a6b903424252af609a9ed"},"description":"% Stay safe while shopping online and in-person during the holidays with this comprehensive cybersecurity guide. Protect your personal and financial information from cyber threats","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=15168#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=15168"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=15168#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/12\/Happy-holowwen.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2023\/12\/Happy-holowwen.png","width":6813,"height":3669},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=15168#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Do You Need a Zero-Trust Architecture for NIST 800-171 &#038; CMMC?"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/91ba4bc98e1a6b903424252af609a9ed","name":"Chris Souza","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d9e77a32df062fd4d46c61b29b00f1be?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d9e77a32df062fd4d46c61b29b00f1be?s=96&d=mm&r=g","caption":"Chris Souza"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=4"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/15168"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=15168"}],"version-history":[{"count":3,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/15168\/revisions"}],"predecessor-version":[{"id":15172,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/15168\/revisions\/15172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/15171"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=15168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=15168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=15168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}