GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Implementing a Zero Trust Architecture

The proliferation of cloud computing, mobile device use, and the Internet of Things has dissolved conventional network boundaries. The workforce is more distributed, with remote workers who need access to resources anytime, anywhere, and on any device, to support the mission. Enterprises must evolve to provide secure access  to company resources from any location and asset, protect interactions with business partners, and shield client server as well as inter-server communications.

A zero trust cybersecurity approach removes the assumption of trust typically given to devices, subjects (i.e., the people and things that request information from resources), and networks. It focuses on accessing resources in a secure manner, regardless of network location, subject, and asset, and enforcing risk-based access controls while continually inspecting, monitoring, and logging interactions.

  • Author(s):
  • Alper Kerman
  • Scott Rose
  • Oliver Borchert
  • Eileen Division
  • Allen Tan
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Implementing a Zero Trust Architecture
  • White Paper
Website:Visit Publisher Website
Publisher:National Cybersecurity Center of Excellence (NCCoE)
Published:October 1, 2020
License:Public Domain

Featured Content

Contact Publisher

Claim Content