The National Institute of Standards and Technology released Draft Special Publication 800-207, Zero Trust Architecture, which discusses the core logical components that make up a zero trust architecture (ZTA) network strategy, and is inviting public comments before issuing final guidance.
Zero Trust is the term used for an evolving set of network security paradigms that move network defenses from wide network perimeters to narrowly focusing on individual or small groups of resources. A Zero Trust Architecture (ZTA) strategy indicates there is no implicit trust granted to systems based on their physical or network location, for example, local area networks versus the internet. Access to data resources is granted when the resource is required, and authentication for both a user and device is verified before the connection is established.
ZTA is a response to enterprise network trends that include remote users and cloud-based assets that are not located within an enterprise-owned network boundary, NIST reported in a release. ZTA focuses on protecting resources, not network segments, as the network location is no longer viewed as the prime component to the security posture of the resource. ZTA strategies are already present in current federal cybersecurity policies and programs, though the document includes a gap analysis of areas where more research and standardization are needed to aid agencies in developing and implementing ZTA strategies. Draft SP 800-207 contains an abstract definition of ZTA and gives general deployment models and use cases where ZTA could improve an enterprise’s overall IT security posture.
A public comment period for this document is open until Nov. 22, 2019. NIST is encouraging you to use the comment template provided when submitting comments. Please submit comments to email@example.com by Nov. 22, 2019.
SP 800-207 (DRAFT) (DOI)
For more information: