Cloud 101CircleEventsBlog
Submit a Peer Review for the AI Controls Matrix—a groundbreaking framework to address AI risks and strengthen security.

Download Publication

Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface
Who it's for:
  • Zero Trust Architects and Implementation Teams
  • CISOs and other CxOs
  • Information Security Managers and Analysts
  • Privacy and Compliance Officers
  • IT Auditors and Assessors
  • Software Developers
  • Network Security Engineers

Defining the Zero Trust Protect Surface

Release Date: 03/05/2024

Working Group: Zero Trust

Enterprise adoption and implementation of Zero Trust is broad and growing. Venture Beat reports that 90% of organizations moving to the cloud are adopting a Zero Trust strategy, while Gartner predicts that 10% of large enterprises will have a mature and measurable Zero Trust security program in place by 2026. How is a mature Zero Trust program achieved? The NSTAC Report to the President on Zero Trust and Trusted Identity Management outlines a five-step process. 

This publication by the CSA Zero Trust Working Group provides guidance on iteratively executing the first step of the Zero Trust implementation process, “Defining the Protect Surface.” Defining the protect surface entails identifying, categorizing, and assessing an organization's data, applications, assets, and services (DAAS); business risk; and current security maturity. In this document, readers will find valuable guidance that starts their Zero Trust security journey on the right path.

Key Takeaways: 
  • The definition of Zero Trust and the Zero Trust protect surface
  • How to initiate the Zero Trust implementation process by defining, analyzing, and prioritizing the organization’s protect surfaces
  • How to identify the DAAS elements to be protected
  • The risks and potential impacts of protect surface compromises
  • The difference between the attack surface and the protect surface
Download this Resource

Bookmark
Share
Related resources
Zero Trust Guidance for Critical Infrastructure - Japanese Translation
Zero Trust Guidance for Critical Infrastructure...
Context-Based Access Control for Zero Trust
Context-Based Access Control for Zero Trust
Zero Trust Guidance for Small and Medium Size Businesses (SMBs)
Zero Trust Guidance for Small and Medium Size B...
AI-Generated Attacks Are Here. Zero Trust Is How We Fight Back.
AI-Generated Attacks Are Here. Zero Trust Is How We Fight Back.
Published: 01/16/2025
The EU AI Act: A New Era of AI Governance Began August 1st
The EU AI Act: A New Era of AI Governance Began August 1st
Published: 01/15/2025
Secrets & Non-Human Identity Security in Hybrid Cloud Infrastructure: Strategies for Success
Secrets & Non-Human Identity Security in Hybrid Cloud Infrastructur...
Published: 01/14/2025
The Emerging Cybersecurity Threats in 2025 - What You Can Do To Stay Ahead
The Emerging Cybersecurity Threats in 2025 - What You Can Do To Sta...
Published: 01/14/2025

Acknowledgements

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA

Erik Johnson

Cloud Security Specialist & Senior Research Analyst, CSA

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Shamik Kacker Headshot Missing
Shamik Kacker

Shamik Kacker

Shruti Kulkarni
Shruti Kulkarni
Information Security Architect, Elexon

Shruti Kulkarni

Information Security Architect, Elexon

I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and...

Read more

Krishna Narayanaswamy Headshot Missing
Krishna Narayanaswamy

Krishna Narayanaswamy

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.

Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. His lea...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training