What Are You Doing For Zero Trust Architecture?

FL
Foley & Lardner

Contributor

Foley & Lardner LLP looks beyond the law to focus on the constantly evolving demands facing our clients and their industries. With over 1,100 lawyers in 24 offices across the United States, Mexico, Europe and Asia, Foley approaches client service by first understanding our clients’ priorities, objectives and challenges. We work hard to understand our clients’ issues and forge long-term relationships with them to help achieve successful outcomes and solve their legal issues through practical business advice and cutting-edge legal insight. Our clients view us as trusted business advisors because we understand that great legal service is only valuable if it is relevant, practical and beneficial to their businesses.
NIST published the Special Publication 800-207 which "defines zero trust as a set of cybersecurity principles used when planning and implementing an enterprise architecture.
United States Media, Telecoms, IT, Entertainment
To print this article, all you need is to be registered or login on Mondaq.com.

NIST published the Special Publication 800-207 which "defines zero trust as a set of cybersecurity principles used when planning and implementing an enterprise architecture. These principles apply to endpoints, services, and data flows. Input and cooperation from various stakeholders in an enterprise is needed for a zero trust architecture to succeed in improving the enterprise security posture." The May 6, 2022 White Paper is entitled "Planning for a Zero Trust Architecture: A Planning Guide for Federal Administrators" which included these comments:

Zero trust provides a collection of concepts designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as contested.

That is, there may be a malicious actor on the network that can intercept or initiate communication.

Zero trust is fundamentally comprised of a set of principles upon which information technology architectures are planned, deployed, and operated.

Zero trust uses a holistic view that considers potential risks to a given mission or business process and how they are mitigated.

As such, there is no single specific zero trust infrastructure implementation or architecture.

Zero trust solutions depend on the workflow (i.e., part of the enterprise mission) being analyzed and the resources that are used in performing that workflow.

Zero trust strategic thinking can be used to plan and implement an enterprise IT infrastructure, this plan is called a zero trust architecture (ZTA).

Of course this for Federal Administrators...what about your non-government operations?

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More