GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Implementing a Zero Trust Architecture

  • Author(s):
  • Alper Kerman
  • Scott Rose
  • Oliver Borchert
  • Eileen Division
  • Allen Tan

The proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved conventional network boundaries. The workforce is more distributed, with remote workers who need access to resources anytime, anywhere, and on any device, to support the mission. Enterprises must evolve to provide secure access  to company resources from any location and asset, protect interactions with business partners, and shield client server as well as inter-server communications.

A zero trust cybersecurity approach removes the assumption of trust typically given to devices, subjects (i.e., the people and things that request information from resources), and networks. It focuses on accessing resources in a secure manner, regardless of network location, subject, and asset, and enforcing risk-based access controls while continually inspecting, monitoring, and logging interactions.

 

Interested in cybersecurity? Check out this GovWhitePapers blog post! You can also find events on cybersecurity on our sister site, GovEvents.

 

  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:National Cybersecurity Center of Excellence
Published:October 1, 2020
License:Public Domain

Featured Content

Contact Publisher

Claim Content