NIST Zero Trust Architecture

2020年4月

NIST Zero Trust Architecture

软件定义边界(SDP)工作组

2014年4月

Abstract

Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move network defenses from static, network-based perimeters to focus on users, assets, and resources. A zero trust architecture (ZTA) uses zero trust principles to plan enterprise infrastructure and workflows. Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet). Authentication and authorization (both user and device) are discrete functions performed before a session to an enterprise resource is established. Zero trust is a response to enterprise network trends that include remote users and cloud-based assets that are not located within an enterprise-owned network boundary. Zero trust focus on protecting resources, not network segments, as the network location is no longer seen as the prime component to the security posture of the resource. This document contains an abstract definition of zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprise’s overall information technology security posture.

Table of Contents

7

Logical Components of Zero Trust Architecture

9

Deployment Scenarios/Use Cases

31

Threats Associated with Zero Trust Architecture

36

Zero Trust Architecture and Possible Interactions with Existing Federal Guidance

40

Migrating to a Zero Trust Architecture

44

更多下载查看

点击下载

深云SDP

零信任SDP专业平台

立即试用

立即试用