Zero Trust Assessment - Iron Bow

We use cookies to improve the functionality and performance of this site. By continuing to use this site, you are providing us with your consent to our use of cookies on the site. Iron Bow does not wish to or intend to collect, store, or process Personal Information, as defined by the General Data Protection Regulation (GDPR), from European Economic Area nationals. By continuing to browse this site and use the services herein, you acknowledge that you are not a European Economic Area national. For more information, view Your Privacy Rights.

Zero Trust Assessment

Zero Trust is not a single product. It is a journey to a new way of approaching access to data and systems. Zero Trust Architecture (ZTA) can potentially leverage existing security infrastructure, but first you need an understanding of what you have, what’s working, and where the holes are. Once that is identified, integration and automation must be completed to achieve the security promise of (ZTA)

Iron Bow’s Zero Trust Assessment aims to gain an understanding of the current cyber security infrastructure and current and future business requirements.  This information is then tied into a workshop to provide an overview of the relevant technologies that should be leveraged and next steps for integration that will transform your security posture.

A Zero Trust Assessment includes:

  • Initial kickoff meeting to validate the end result of the assessment is agreed upon by all parties.
  • Pre-assessment questionnaire filled out by client that covers:
    • User inventory
    • Device inventory
    • Security policy
    • Supported applications and data
    • Monitoring, orchestration, and analytics
  • Initial information gathering utilizing the answers to the pre-assessment questionnaire
    • Validate existing user, device, monitoring, and applications
    • Apply the business use case being addressed by the assessment
    • Gain full understanding of all network and security applications being used currently
    • Recommend tools to use as part of the assessment
    • Gain understanding of how end users access the network today and goals for the future
  • Interview key stakeholders
    • User admin
    • Device admin
    • Policy admin
    • Network admin
    • Security analyst
  • Optionally, conduct assessment of efficacy of existing controls
  • Deliver ZTA Roadmap Recommendations
    • Roadmap is broken down along the pillars of Zero Trust: Users, Devices, Network, Application, Data, Monitoring/Analytics, and Orchestration. Each area will have its own focus area.
  • Cloud
  • Collaboration
  • Cyber
  • Data
  • Digitization
    + IoT
  • Managed
  • Mobility +
    End User Devices
  • Networking