Need cloud computing? Get started now

How to Implement Zero Trust on a Budget

Dayna Jackson

Written by

Dayna Jackson

September 03, 2024

Dayna Jackson

Written by

Dayna Jackson

Dayna Jackson is the Senior Manager of Strategic Marketing for the Public Sector at Akamai. She develops high-impact strategies and programs, through direct and channel partnerships, for the advancement of the public sector.

Budget concerns shouldn’t impede modernization, especially when data breaches and vulnerabilities run rampant.
Budget concerns shouldn’t impede modernization, especially when data breaches and vulnerabilities run rampant.

The modern digital battleground is fraught with challenges. Cyberthreats like malware, ransomware, and social engineering are more sophisticated than ever. Remote and hybrid work models have expanded organizations' attack surfaces, and new technologies like artificial intelligence (AI) further complicate security initiatives. That’s why Zero Trust, a paradigm shift in cybersecurity, has become critical for federal agencies.

In 2021, the President released Executive Order 14028, which mandates that all federal agencies implement a Zero Trust security model to better protect sensitive data from cyberattacks. The deadline is fast approaching: all federal agencies must implement Zero Trust by September 30, 2024.

However, budget constraints add a layer of complexity to the already daunting task that agencies face in implementing a comprehensive Zero Trust architecture. But budget concerns shouldn’t impede modernization, especially when data breaches and vulnerabilities run rampant.

In a recent FedInsider webinar, Akamai’s Brian Dennis, Principal Technologist for the Public Sector, shared strategies for how agencies can implement a Zero Trust approach on a budget. Here’s the rundown.

What is Zero Trust?

Zero Trust is a security strategy that follows the core principle: “Never trust, always verify.” It strengthens network security and prevents unauthorized access by assuming that all network traffic could be malicious. 

Zero Trust requires continuous monitoring and authorization of all devices that request network access. Each user's identity must be verified each time, regardless of whether they have been given access before.

Zero Trust also helps secure the expanded attack surface of today’s hybrid and remote workplace landscape. Organizations may set up firewalls by applying encrypted VPNs to ensure remote devices have the same user experience as on-premises ones — and are subject to the same rigorous security controls.

Zero Trust is not one defined security measure; rather, it’s a system of security policies and access management tactics. Some common Zero Trust tactics include granting least-privilege access to ensure minimum permissions, gathering threat intelligence in real time, creating a multilayered defense through network segmentation or microsegmentation, and implementing multi-factor authentication (MFA) to provide an extra level of protection.

Three steps to begin your Zero Trust journey

Three steps to begin your Zero Trust journey while heeding budget constraints include:

1. Understand the challenges of establishing a Zero Trust network

Anticipating potential roadblocks ahead of time will help your Zero Trust journey go smoothly. When it comes to implementation, the main challenges can be broadly categorized into four key areas:

  • Legacy systems: Modernizing outdated infrastructure is crucial but expensive.

  • Network complexity: Migrating to a Zero Trust model requires rethinking network design and access control.

  • Cybersecurity talent shortage: Finding and retaining skilled professionals is another cost.

  • Culture shift: Adopting a “verify first” mentality requires training and buy-in across stakeholders and the entire agency.

2. Budget for Zero Trust success

Strategic planning and phased deployment are critical to successfully implementing a Zero Trust strategy. As agencies navigate these complexities, the emphasis should be on efficiently allocating resources and incrementally building a robust security posture. Even the most sophisticated security solution is only effective if strategically implemented and adapted to budgetary constraints.

In the webinar, Dennis noted that budgeting starts with a holistic approach to Zero Trust. “It’s not just a product or service you can buy off the shelf,” he explained. “It’s the security framework that requires a comprehensive approach.”

This holistic approach ensures that agencies are not only addressing immediate needs, but also setting the foundation for a resilient and adaptable security ecosystem — and a more secure future. Following this advice, agencies can implement Zero Trust policies through various strategies that adjust to available budgets.

Approaches can include:

  • Identifying and securing targets: Create a “layered defense” by first securing high-value targets that are most attractive to cyberattackers. This approach helps mitigate risks while optimizing resource allocation.

  • Working in phases: Start with a smaller, manageable project area and expand in a phased approach from there. Demonstrate the success of this initial implementation, gathering data on improved security posture and reduced risks. Use this data to secure further funding and buy-in for subsequent phases.

  • Exploring open-source solutions: Many high-quality, open-source Zero Trust solutions exist for access control, identity management, and other essential Zero Trust components. 

  • Upskilling your workforce: Training programs and certifications can help current staff understand the Zero Trust principles and manage them effectively.

  • Forming a strategic partnership: Working directly with a cybersecurity service provider can help you streamline Zero Trust implementation. An experienced partner can offer government agencies valuable guidance,  optimization suggestions, technical expertise, and access to cost-effective risk management solutions that meet your specific needs.

3. Deploy available resources

Take advantage of the wealth of valuable resources that have been created to help agencies like yours establish a Zero Trust framework:

Your Zero Trust journey begins today

While Zero Trust represents a significant shift in cybersecurity, agencies can embark on their Zero Trust journey with confidence.

“The pathway to Zero Trust will be different for everyone,” said Dennis, “so we have to really listen to the people and the organizations we work with and find that right integrated solution.”

Akamai’s technologies and services align with the principles of Zero Trust, providing agencies with the necessary tools to secure their digital environments effectively. Watch the FedInsider webinar and contact us to learn how we can help your agency navigate the path to Zero Trust.



Dayna Jackson

Written by

Dayna Jackson

September 03, 2024

Dayna Jackson

Written by

Dayna Jackson

Dayna Jackson is the Senior Manager of Strategic Marketing for the Public Sector at Akamai. She develops high-impact strategies and programs, through direct and channel partnerships, for the advancement of the public sector.