Blog
Small- and medium-sized businesses (SMBs) have less access to skills and resources than others in enforcing the popular strategy. What’s doable?
A ‘zero-trust’ checklist for SMBs
Zero trust may be daunting for SMBs, but it isn’t impossible. Learn the recommended steps to building a zero-trust network and what to prioritize for maximum efficacy.
Most companies see the value in moving to a zero-trust model, and many large organizations and government agencies have either already begun the process or are well-practiced in enforcing the approach.
For smaller companies, however, there are significant barriers to moving to a zero-trust model, including cost, infrastructure, and skilled staff who can implement and enforce a feasible zero-trust plan. As a result, SMBs have been slower to get on board despite the cybersecurity benefits.
These barriers might make building a zero-trust architecture more daunting, but it isn’t impossible. A number of the tools and processes needed to begin building a zero-trust foundation may already be in place as a result of compliance with data regulations and other fundamental cybersecurity best practices.
John Kindervag, the founder of Zero Trust, offers five steps1 to building a zero-trust network, recognizing that the framework will be a long journey for some:
The White House released a memo2 with guidelines for a zero-trust strategy, which uses CISA’s Zero Trust Maturity Model.3 Although the strategy is designed for government agencies, it still offers a North Star for SMBs to see what types of tools they’ll need to begin their zero-trust implementation. For example:
In an ideal world, an airtight zero-trust strategy would have no need for detection and response. But in the real world, zero trust cannot and should not replace the need for detection and response controls. In fact, detection and response should be factored into the zero-trust methodology for maximum effectiveness. Your zero-trust strategy should also include:
SMBs may not have the in-house staffing for these tasks. Working with managed service providers can fill in the missing parts of cybersecurity hygiene that are needed to implement zero trust.
Let’s be clear: Zero trust is tough to implement—even in large enterprise environments with bigger security budgets and security teams. But simplicity remains at the heart of this framework; overhauling the management of what’s trusted versus untrusted can be freeing in the long run. As a starting point, SMBs should keep the scope small. Have policies and security tools in place to practice good cybersecurity hygiene, especially MFA and data encryption. Then, find the right partners to help build and maintain your zero-trust architecture.
1Charlie Bedell, “John Kindervag’s Five Steps for Zero Trust,” illumio, February 2, 2024.
2Shalanda D. Young, “Moving the U.S. Government Toward Zero Trust Cybersecurity Principles,” Memorandum for the Heads of Executive Departments and Agencies, January 26, 2022.
3 Cybersecurity and Infrastructure Security Agency, “Zero Trust Maturity Model,” April 2023.