No More Chewy Centers: Introducing The Zero Trust Model Of Information Security
Forrester report by John Kindervag, Nov 2010. Coined the term and set the philosophy.
Forrester report by John Kindervag, Nov 2010. Coined the term and set the philosophy.
This document provides background, references and initial planning guidance that apply the principles from traditional network microsegmentation to the challenges associated with zero trust architectures (ZTAs) and dynamic policy enforcement. In the context of dynamic policy enforcement and ZT, microsegmentation is more than a network discussion or capability.
CISA’s Zero Trust Maturity Model is one of many roadmaps that agencies can reference as they transition towards a zero trust architecture. The maturity model aims to assist agencies in the development of zero trust strategies and implementation plans and to present ways in which various CISA services can support zero trust solutions across agencies.
The objective of this publication is to provide guidance for realizing an architecture that can enforce granular application-level policies while meeting the runtime requirements of ZTA for multi-cloud and hybrid environments.
NIST Special Publication 800-207. This document contains an abstract definition of zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprise’s overall information technology security posture.
The book provides you with information on how to implement and manage a zero-trust architecture across these different layers of an infrastructure.