Company
Date Published
Author
Daniel Dong
Word count
2525
Language
English
Hacker News points
None

Summary

Most organizations are still in the "build phase" of implementing Zero Trust Network Access (ZTNA), with only a small percentage having fully mature implementations. The majority of respondents can segment traffic on a resource level, but there are significant gaps in implementing least-privilege access, reducing public attack surface, upgrading authentication protocols to FIDO2/WebAuthn, and managing all ZTNA pillars under a single pane of glass. To address these challenges, organizations should focus on segmenting and filtering traffic at the resource level, upgrading their identity authentication protocols, adopting least-privilege access models, and centralizing the management of their ZTNA infrastructure. By benchmarking their ZTNA practices against industry benchmarks, organizations can identify areas for improvement and create a roadmap to achieve a comprehensive, robust ZTNA infrastructure.