Cloud Security

Eighty percent of IT and security professionals prioritize zero trust, says a new survey

Cloud Security Alliance
The RSA Conference takes place every year in San Francisco. CISO Perspectives and Progress in Deploying Zero Trust was issued today by the Cloud Security Alliance (CSA), the world's largest organization dedicated to developing standards, certifications, and best practices to help ensure a safe cloud computing environment. The exploratory study, conducted by the Zero Trust Advancement Center (ZTAC), interviewed over 800 IT and security experts to discover where Zero Trust ranks as a priority inside their organizations, as well as the top business and technical difficulties they've faced throughout implementation.

"The philosophy of Zero Trust has the potential to fundamentally reshape our approach to securing the technology we use across the board over the course of the next few years. Arriving at this destination requires greater clarity and a common understanding of Zero Trust principles as well as articulating concise strategies and adopting the appropriate frameworks. This survey is data rich and should be carefully contemplated by the industry to identify the roadblocks and opportunities for pervasive Zero Trust. CSA is aggressively producing valuable research such as this within our Zero Trust Advancement Center to bring the topic in focus for our community," said Jim Reavis, CEO, of Cloud Security Alliance.

The study gathered 823 responses from IT and security experts from diverse business sizes and regions, including 219 C-level executives. This is the first part of a multi-part survey that will take place this year. Courses in Zero Trust architecture and strategy, a CloudBytes webinar series, multiple research whitepapers, an annual Zero Trust Summit to begin in Q4 2022, and new professional certification, the Certificate of Zero Trust Knowledge, are among the ZTAC's upcoming initiatives during the next 18 months (CZTK).

The Zero Trust Advancement Center builds on the breakthrough Software-Defined Perimeter study series, Cloud Controls Matrix, Enterprise Architecture, and other relevant virtualized security concepts developed by the CSA. Organizations can sign up for the initiative and register their interest at cloudsecurityalliance.org/ZT.

Spotlight

Excessive permissions in your AWS environment is a common pitfall that exposes your organization to unnecessary risk. IAM policies alone are not enough to achieve the Principle of Least Privilege. Our white paper, "10 Steps to Eliminating Access Risks in AWS," provides a clear step-by-step guide to evaluating permissions and ach


Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

Excessive permissions in your AWS environment is a common pitfall that exposes your organization to unnecessary risk. IAM policies alone are not enough to achieve the Principle of Least Privilege. Our white paper, "10 Steps to Eliminating Access Risks in AWS," provides a clear step-by-step guide to evaluating permissions and ach

Resources