{"id":62265,"date":"2023-03-23T09:50:52","date_gmt":"2023-03-23T13:50:52","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=62265"},"modified":"2023-08-30T09:39:58","modified_gmt":"2023-08-30T13:39:58","slug":"unexpected-roadblocks-zero-trust","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/unexpected-roadblocks-zero-trust","title":{"rendered":"6 Unexpected Roadblocks Organizations Face with Zero Trust Security"},"content":{"rendered":"\n

It seems like everyone is singing the praises of Zero Trust security \u2014 even United States President Joe Biden. <\/p>\n\n\n\n

Last year, the president signed an executive order<\/a> aimed at migrating the federal government to a Zero Trust Architecture (ZTA). <\/p>\n\n\n\n

Biden said the government was adopting ZTA to \u201cmodernize its approach to cybersecurity and today\u2019s dynamic and increasingly sophisticated cyber threat environment.\u201d The Office of the President<\/a> went on to say the cybersecurity framework would enable departments to \u201ctighten access controls.\u201d<\/p>\n\n\n\n

\"Franklin`s<\/figure>\n\n\n\n

If you\u2019ve worked in the IT industry long enough, you probably know one thing to be true when it comes to project management: expect the unexpected. Anomalies are inevitable and, unfortunately, reality doesn\u2019t always meet ideals. <\/p>\n\n\n\n

Despite the publicity, only 23% of small and medium-sized enterprises (SMEs)<\/a> have fully adopted Zero Trust security programs to date. SMEs often cite budgetary constraints, labor shortages, integration difficulties, and lack of knowledge as reasons for not adopting Zero Trust (ZT). <\/p>\n\n\n\n

At JumpCloud, the most common misconception we come across is that ZT must involve several moving pieces at once. In this article, we\u2019ll discuss the most common Zero Trust challenges that stop IT managers in their tracks and how to overcome them. Let\u2019s get started:<\/p>\n\n\n\n

When Reality Fails to Meet Expectations with Zero Trust<\/h2>\n\n\n
\n
\"Woman<\/figure><\/div>\n\n\n

The concept of \u201cZero Trust\u201d is deceptively simple. It means that any devices, users, and applications attempting to access an IT resource of any kind must first receive validation. The mantra \u201ctrust nothing, verify everything\u201d is ubiquitous with the security framework. <\/p>\n\n\n\n

So instead of granting implicit trust<\/em> upon the initial entry to a protected network, organizations evaluate an opinion of trustworthiness based on context, and at every access transaction.<\/p>\n\n\n\n