The 7 Core Pillars of a Zero-Trust Architecture (2024)

Answer

Learn how Forrester's Zero Trust Extended framework can help IT leaders identify, organize and implement the appropriate cybersecurity tools for a zero-trust framework.

The 7 Core Pillars of a Zero-Trust Architecture (1)

By

  • Andrew Froehlich,West Gate Networks

Published: 30 May 2024

The zero-trust framework is gaining traction in the enterprise due to its security benefits. Organizations are increasingly adopting a zero-trust model in their security programs, replacing the traditional perimeter-based security model.

The perimeter-based model considers users, devices and resources residing directly on the corporate LAN and WAN as more trustworthy than those from outside the network. The challenge presented by insider threats and the explosion of IoT and edge devices required major changes to the security architectures and tools implemented on enterprise networks. This is where the seven zero-trust pillars come into play because, in a zero-trust model, everything is considered untrusted, regardless of where the user or resource resides.

But making the switch to a zero-trust model requires logistical considerations and planning. To help with the migration from a perimeter-based security architecture to a zero-trust framework, many organizations have referred to the Forrester Zero Trust Extended (ZTX) framework to help. ZTX has become a go-to reference on how to best purchase and implement the right tools, policies and methodologies.

The following is an introduction to Forrester's ZTX framework that breaks down the necessary pillars to properly deploy zero-trust security across all technologies and corporate cultures.

This article is part of

What is the zero-trust security model?

  • Which also includes:
  • What is zero-trust network access? ZTNA basics explained
  • How to build a zero-trust network in 4 steps
  • Top 6 challenges of a zero-trust security model
Download1Download this entire guide for FREE now!

1. Workforce security

The workforce security pillar centers around the use of security tools, such as authentication and access control policies. These tools identify and validate the user attempting to connect to the network before applying access policies that limit access to decrease the attack surface area.

2. Device security

Much like workforce security, the primary goal of the device security pillar is identification and authorization when devices attempt to connect to enterprise resources. The devices can be user-controlled or completely autonomous, as in the case of IoT devices.

3. Workload security

The workload security pillar refers to the applications, digital processes, and public and private IT resources used by an organization for operational purposes. Security is wrapped around each workload to prevent data collection, unauthorized access or tampering with sensitive apps and services.

4. Network security

The network security zero-trust pillar is used to help microsegment and isolate sensitive resources from being accessed by unauthorized people or things.

The 7 Core Pillars of a Zero-Trust Architecture (2)

5. Data security

This zero-trust pillar revolves around the categorization of corporate data. Once categorized, the data can be isolated from everyone except those that need access. This pillar also includes the process of determining where data should be stored, as well as the use of encryption mechanisms while data is in transit and at rest.

The 7 Core Pillars of a Zero-Trust Architecture (3)

6. Visibility and analytics

All security processes that revolve around access control, segmentation, encryption, and application or data organization must be closely monitored. The visibility and analytics pillar can prescribe the use of AI to automate some processes, including anomaly detection, configuration control and end-to-end data visibility.

7. Automation and orchestration

The final pillar of the zero-trust framework covers modern ways in which organizations can automate and centrally control the entire zero-trust model on the LAN, WAN, wireless WAN, and public or private data centers.

Security leaders can implement these seven pillars of the ZTX model to apply the appropriate security tools and better secure IT. The ZTX playbook or similar zero-trust pillars are designed to help IT security administrators identify, organize and implement the appropriate security tools that satisfy the overall goal of a zero-trust strategy.

Editor's note: This article was updated in May 2024 to improve the reader experience.

Andrew Froehlich is founder of InfraMomentum, an enterprise IT research and analyst firm, and president of West Gate Networks, an IT consulting company. He has been involved in enterprise IT for more than 20 years.

Next Steps

How to build a zero-trust network

What is zero-trust network access? ZTNA basics explained

An overview of the CISA Zero Trust Maturity Model

The principles of zero-trust security

How to choose the best ZTNA vendor for your organization

Related Resources

Dig Deeper on Risk management

Related Q&A from Andrew Froehlich

Zero trust vs. defense in depth: What are the differences?

Security administrators don't have to choose between zero-trust and defense-in-depth cybersecurity methodologies. Learn how the two frameworks ...Continue Reading

Top 6 benefits of zero-trust security for businesses

The zero-trust security model demands infosec leaders take a holistic approach to IT infrastructure security. Learn about the top six business ...Continue Reading

What is extortionware? How does it differ from ransomware?

Prevention is the only line of defense against an extortionware attack. Learn how extortionware works and why it can be more damaging than ransomware.Continue Reading

The 7 Core Pillars of a Zero-Trust Architecture (2024)
Top Articles
Latest Posts
Article information

Author: Prof. Nancy Dach

Last Updated:

Views: 5563

Rating: 4.7 / 5 (57 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Prof. Nancy Dach

Birthday: 1993-08-23

Address: 569 Waelchi Ports, South Blainebury, LA 11589

Phone: +9958996486049

Job: Sales Manager

Hobby: Web surfing, Scuba diving, Mountaineering, Writing, Sailing, Dance, Blacksmithing

Introduction: My name is Prof. Nancy Dach, I am a lively, joyous, courageous, lovely, tender, charming, open person who loves writing and wants to share my knowledge and understanding with you.