GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Zero Trust Architecture

The Special Publication 800-series reports on The Information Technology Laboratory’s (ITL) research, guidelines, and outreach efforts in information system security, and its collaborative activities with industry, government, and academic organizations.

This document is intended to describe zero trust for enterprise security architects, cybersecurity managers, network administrators, and managers. It is meant to aid understanding of zero trust for civilian unclassified systems and provide a road map to migrate and deploy zero trust security concepts to an enterprise environment. It is not intended to be a single deployment plan for ZTA as an enterprise will have unique business use cases and data assets that require safeguards. Starting with a solid understanding of the organization’s business and data will result in a strong approach to zero trust.

  • Author(s):
  • Scott Rose
  • Oliver Borchert
  • Stu Mitchell
  • Sean Connelly
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Zero Trust Architecture
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:National Institute of Standards and Technology (NIST)
Published:August 28, 2020
License:Public Domain

Featured Content

Contact Publisher

Claim Content