The National Security Agency (NSA) is released the first two products in a series of Zero Trust Implementation Guidelines (ZIGs) to provide practical, actionable recommendations to facilitate the implementation of Zero Trust (ZT).These initial releases cover the Primer and the Discovery Phase, which together set the groundwork for future guidance tied to the Department of War CIO Zero Trust Framework. These are actionable strategies for organizations outlining architecture, maturity models and guidance.
This series of reports outlines the steps to implement the technologies and processes that support achieving the Target-level ZT Capabilities, Activities, and Expected Outcomes described in the Department of War (DoW) CIO ZT Framework.
Released on 14 Jan the Primer and Discovery Phase are the gateway to ZT implementation, providing guidance and direction to ensure organizations are fully equipped to digest and implement the Phase 1 and Phase 2 ZIGs upon their release.
The Primer phase outlines the strategy and principles used to develop the ZIGs and provides a holistic approach to maximizing the usage of the series. Notably, the ZIGs are designed to be modular, allowing organizations at different levels of ZT maturity to select and implement the capabilities most relevant to the needs of their environment.
The Discovery Phase is intended to help organizations establish foundational visibility and understand the critical data, applications, assets, and services, as well as access and authorization activity existing within the architecture.
System owners, cybersecurity professionals and stakeholders should review these foundational guidelines to gain a deeper understanding of ZT activities and their organization’s operational landscape in preparation for the release of the Phase 1 and Phase 2 ZIGs.
As mandated by Executive Order (EO) 14028, the United States Government (USG) developed several ZT strategies, to achieve ZT.
Key foundational documents outlining architecture, maturity models and guidance
supporting this effort include:
Read the full products below:
The Foundation Document for Zero Trust
Zero Trust Implementation Guideline Primer
The purpose of this document was developed in furtherance of NSA’s cybersecurity missions, including its
responsibilities to identify and disseminate threats, and to develop and issue cybersecurity specifications
and mitigations for National Security Systems, Department of War information systems, and the Defense
Industrial Base. This information may be shared broadly to reach all appropriate stakeholders.
The ZIGs phased implementation approach is as follows:
The Zero trust strategies include frameworks, guidelines and maturity models designed to assist organizations in implementing ZT.
Recent Comments