A CISO’s Reality: Discovery is Where Zero Trust Programs Quietly Die

David Warshavski, Co-founder and CPO
January 16, 2026

If you’re a CISO, you’ve seen this movie before. 

You commit to Zero Trust. The board likes the direction. The roadmap looks crisp. Then you hit the “Discovery” phase, which, quietly turns from a foundation into a bottleneck.  Suddenly, your security team is stuck asking the same four questions over and over: 

  1. “What applications do we actually run?”
  2. “Which datasets matter most to the business?”
  3. “Who actually owns this asset?”
  4. “Why do five different systems disagree about what this object even is?” 

Discovery inevitably becomes a quarterly spreadsheet ritual - a cycle of exports, manual meetings, and Slack pings to a CMDB that is always one re-org behind reality.

The NSA’s recently published Zero Trust Implementation Guideline - Discovery Phase (January 2026) validates this pain. Its core premise is blunt: If you cannot describe your environment, enforcement becomes guesswork. The guideline also exposes the hard truth CISOs feel every day: manual discovery does not scale. For modern enterprises, it becomes highly expensive and inefficient.

This is where agentic systems change Discovery from a documentation project into a continuous operating model.

The “Truth” Wall: Why Reality is Harder Than Controls


Most Zero Trust programs don’t fail because controls are weak. They stall because the system of record is wrong.

The NSA framework emphasizes building confidence across your environment (data, applications, assets, services). Most CISOs aren’t blocked by a lack of controls; they are blocked by a lack of truth.

You likely have scanners, cloud inventories, and governance docs. But when you try to move toward target-level Zero Trust - granular segmentation, access tightening, data policy enforcement - you hit the same wall:

  • Organizational context is missing: critical apps have no reliable owner in the system of record
  • Entity fragmentation: the same application has three names across cloud, CMDB, and security tools
  • The shadow gap: new cloud resources and service dependencies show up faster than teams can tag and classify them

To solve this, we have to stop treating Discovery like a “cleanup” project and start treating it as a loop.

A Quick Story: How This Looks in the Real World

One enterprise customer came to us mid-Zero Trust initiative with a familiar blocker: “We’re not stuck on policy. We’re stuck on ownership and dependencies.”

In a multi-cloud production environment with thousands of services, a new cloud data store appeared and was immediately flagged by security tooling. The CMDB had no owner. The data platform team said, “not ours.” The app team said, “we just consume it.” Meanwhile, the security team couldn’t decide whether to restrict access without breaking production.

With Agentic Discovery, the system pulled the surrounding evidence: a recent change ticket referencing the store, an architecture doc describing the producing service, and an on-call rotation tied to the owning team. The agent proposed the owner and dependency chain with citations, routed a one-click confirmation to the right team lead and then pushed the resolved context back into the system of record.

What changed wasn’t “more visibility.” What changed was that discovery stopped being a series of endless meetings - and became a mechanism.

Moving from “Asking” to “Fetching” with Agentic Discovery

Traditional Discovery tells you what is missing. Agentic Discovery closes the gap. Instead of just flagging a missing “Owner” field, agentic systems connect to the messy sources where ownership and intent actually live - tickets, runbooks, architecture docs, collaboration threads - and retrieve the missing context with evidence. Humans don’t spend their time hunting; they spend their time confirming and acting.

And the difference is not just automation. Traditional automation follows predefined rules. Agentic Discovery reasons across evidence, weighs confidence, and knows when to ask for human confirmation versus when to act.

That judgment layer is what turns discovery from a reporting function into an operating model.

Applications & Services: Authoritative Inventory

The goal isn’t just a list; it’s a master inventory that understands dependencies.

  • The Manual Way: Sending emails to engineering leads to verify app tiers and owners
  • The Agentic Way: Agents reconcile “same thing, different names” across environments with evidence. They retrieve missing context - like who’s referenced as the on-call in a runbook or which Jira epic describes a dependency - and propose updates with citations, routing only the uncertain edge cases for confirmation
  • Impact: Fewer “we can’t enforce this yet” delays, and fewer broken changes caused by unknown dependencies, and faster, safer enforcement of segmentation and access policies

Data: Risk-Aligned Catalogs

The NSA explicitly emphasizes the need for continuously updated metadata.

  • The Manual Way: A “data tagging” project that is out of date by the time it finishes
  • The Agentic Way: Agents detect data stores and data paths via telemetry, then link Data → Producing App → Business Context. By analyzing operational artifacts, agents propose classifications and owners, creating a drift loop that alerts you the moment a new, unclassified dataset appears
  • Impact: Data policy becomes enforceable because you finally know what you’re protecting and why

Operating Model: Continuous Validation

Zero Trust isn’t a once-and-done state; your environment moves every day.

  • The Manual Way: Quarterly reconciliation meetings
  • The Agentic Way: Continuous reconciliation across all sources. When deltas appear, the agent groups them into manageable campaigns (e.g., “Top 10 unowned prod apps”) and pushes enriched context into the workflows where teams already live (ServiceNow, Jira), with lightweight human confirmation when required
  • Impact: Discovery becomes a measurable operational motion, not a backlogged initiative

The NSA’s Discovery Phase is a brilliant roadmap. But without an agentic operating layer, it becomes a labor trap.

Traditional Discovery tells you the map is broken. Agentic Discovery fixes the map while you drive.

That’s how Zero Trust moves from a guideline to an enforceable architecture - continuously, credibly, and at enterprise scale.


Agentic AI
AI
Exposure Management
NSA Zero Trust Implementation Guidelines
Tonic solution
Cybersecurity