Implementing Zero Trust Architecture
Implementing Zero Trust Architecture
June 2025
FINAL
National Institute of Standards and Technology Special Publication 1800-35, Natl. Inst. Stand. Technol.
Spec. Publ. 1800-35, 55 pages, (June 2025), CODEN: NSPUE2
FEEDBACK
You can view or download the final guide at the NCCoE ZTA project page.
All comments are subject to release under the Freedom of Information Act.
To learn more about the NCCoE, visit https://www.nccoe.nist.gov/. To learn more about NIST, visit
https://www.nist.gov.
The documents in this series describe example implementations of cybersecurity practices that
businesses and other organizations may voluntarily adopt. These documents do not describe regulations
or mandatory practices, nor do they carry statutory authority.
ABSTRACT
A zero trust architecture (ZTA) enables secure authorized access to enterprise resources that are
distributed across on-premises and multiple cloud environments, while enabling a hybrid workforce and
partners to access resources from anywhere, at any time, from any device in support of the
organization’s mission. This NIST Cybersecurity Practice Guide explains how organizations can
implement ZTA consistent with the concepts and principles outlined in NIST Special Publication (SP) 800-
207, Zero Trust Architecture. The NCCoE worked with 24 collaborators under Cooperative Research and
Development Agreements (CRADAs) to integrate commercially available technology to build 19 ZTA
example implementations and demonstrate a number of common use cases. The Guide includes
detailed technical information on each example ZTA implementation, providing models that
organizations can emulate. The guide also summarizes best practices and lessons learned from the
implementations and integrations to make it easier and more cost-effective to implement ZTA.
Additionally, this guide includes mappings of ZTA principles and technologies to commonly used security
standards and guidelines.
ACKNOWLEDGMENTS
We are grateful to the following individuals for their generous contributions of expertise and time.
* Former employee; all work for this publication was done while at that organization
The Technology Collaborators who participated in this project submitted their capabilities in response to
a notice in the Federal Register. Respondents with relevant capabilities or product components were
invited to sign a Cooperative Research and Development Agreement (CRADA) with NIST, allowing them
to participate in a consortium to build this example solution. 1 We worked with:
Technology Collaborators
DOCUMENT CONVENTIONS
The terms “shall” and “shall not” indicate requirements to be followed strictly to conform to the
publication and from which no deviation is permitted. The terms “should” and “should not” indicate that
among several possibilities, one is recommended as particularly suitable without mentioning or
excluding others, or that a certain course of action is preferred but not necessarily required, or that (in
the negative form) a certain possibility or course of action is discouraged but not prohibited. The terms
“may” and “need not” indicate a course of action permissible within the limits of the publication. The
terms “can” and “cannot” indicate a possibility and capability, whether material, physical, or causal.
1
Note that after the VMware End User Computing division products were implemented at the NCCoE, VMware
was acquired by Broadcom, and then the VMware End User Computing Division was divested and reformed under
a new entity, Omnissa LLC. Symantec was also previously acquired by Broadcom.
As of the date of publication and following call(s) for the identification of patent claims whose
use may be required for compliance with the guidance or requirements of this publication, no
such patent claims have been identified to ITL.
No representation is made or implied by ITL that licenses are not required to avoid patent
infringement in the use of this publication.
List of Figures
Figure 3-1 General ZTA Reference Architecture .................................................................................... 8
Figure 3-2 EIG Crawl Phase Reference Architecture ............................................................................ 10
Figure 3-3 Physical Architecture of ZTA Lab ........................................................................................ 11
List of Tables
Table 4-1 Mapping of Builds to Online Details Regarding Architecture Descriptions and
Implementation Instructions.............................................................................................................. 17
There is no single approach for each organization to migrate to ZTA. Therefore, the NIST National
Cybersecurity Center of Excellence (NCCoE) worked with 24 technology providers to demonstrate
practical implementation of ZTA principles from NIST SP 800-207. Together, we have built and
implemented 19 example ZTA solutions in lab environments, leveraging the technology from our
collaborators. For each of the example ZTAs, we have outlined detailed technical information, including
architecture, sample technologies leveraged, specific configurations and integrations of technologies,
and use cases and scenarios demonstrated.
We have also created mappings between the example ZTA security capabilities and the NIST
Cybersecurity Framework (CSF) versions 1.1 and 2.0 [2][3], NIST SP 800-53r5 [4], and NIST critical
software security measures. These mappings were developed to support why and how organizations can
implement ZTA.
This guide is intended to help your organization gradually evolve existing environments and technologies
into a ZTA over time. It provides practical information that you can use to develop your ZTA roadmap,
including models you can emulate and examples of how to best leverage existing technology
infrastructure. The lessons we have learned from our demonstrations can benefit your organization by
saving time and resources.
By utilizing this guide, your organization can be better positioned to implement a ZTA that achieves the
following:
1.1 Audience
The primary audience for this guide is organizations looking to implement ZTA. The document assumes
an existing level of cybersecurity knowledge and capabilities to deploy ZTA components and supporting
components for data security, endpoint security, identity and access management, and security
analytics. The enterprises are also assumed to have critical resources that require protection, some of
which are located on-premises and others of which are in the cloud; and a requirement to provide
partners, contractors, guests, and employees, both local and remote, with secure access to these critical
resources. For a full list of assumptions for this project, see our supplemental Assumptions
documentation. This paper is not specific to federal agency audiences.
Readers of this guide should already be familiar with ZTA basics and the topics covered in NIST SP 800-
207, Zero Trust Architecture [1].
1.2 Scope
The scope of this guide is implementing a ZTA for a conventional, general-purpose enterprise IT
infrastructure with support for traditional IT resources such as laptops, desktops, servers, mobile
devices, and other systems with credentials. Discovery of resources, assets, communication flows, and
other elements is also within scope. The focus is on using the ZTA to protect access to enterprise data,
regardless of who initiates the access request (e.g., enterprise employees, partners, contractors, or
corporate network guests), from where the access request is initiated (e.g., from the corporate network,
a branch office, or the public internet), or where the resources are located (e.g., on-premises or in the
cloud).
ZTA for industrial control systems, operational technology (OT) environments, and Internet of Things
(IoT) devices are explicitly out of scope for this project. For information on other related NCCoE projects,
see [5][6]. Addressing the risk and policy requirements of discovering and classifying data [7] is also out
of scope.
Readers are encouraged to begin by reading the document in PDF format (this document) to gain high-
level insight into the project. Readers may then drill down from this document into the deeper sections
of the linked online document in web format to access in-depth information as needed. Therefore, this
document is organized as follows:
Section 2 provides an overview of the NCCoE’s “Implementing a Zero Trust Architecture” project
from the viewpoints of motivation for the project, challenges in implementing ZTA, project
execution and implementation approach, as well as collaborating organizations and their
contributions to the project.
Section 3 discusses the reference architectures considered for demonstrating various types of
ZTA deployment approaches used across the 19 implementations built. It also lists the
technology products, along with out-of-the-box capabilities used in each build. Furthermore,
this section provides information regarding the NCCoE lab’s physical architecture platform used
to implement the builds.
Section 4 lists 19 example implementations in a table format with relevant columns that identify
technology products and capabilities used as “Policy Engines/Policy Decision Points,” as well as
ZTA deployment approaches used in each implementation. Also, additional table columns
provide links to details available in web format with respect to build architecture, technologies
used, and flow diagrams, including instructions for each implementation.
Section 5 explores the noteworthy findings and conclusions recorded throughout the
demonstration of each ZTA deployment approach across 19 unique lab implementations.
Section 6 discusses the essence of functional demonstrations scoped for the project from the
viewpoints of demonstration methodology, use cases, and scenarios. It also lists the functional
demonstration results for each implementation, both in summary and fully detailed formats.
Section 7 provides information regarding each build’s implemented security capabilities and
their mappings to the NIST CSF versions 1.1 and 2.0, NIST SP 800-53r5, and NIST critical software
security measures.
Section 8 concludes this document by sharing a list of takeaways as recommended steps for a
zero trust journey, intended for organizations that are considering ZTA adoption for their
environments.
ZTA implementers and others seeking detailed information on designing and deploying ZTA solutions are
encouraged to read all sections of the guide, as well as utilize the wealth of additional resources linked
to throughout those sections.
Cybersecurity professionals, compliance professionals, and others who are primarily concerned with
how ZTA solutions relate to the CSF, NIST SP 800-53, and NIST critical software security measures should
focus on Section 7 and the resources it links to.
Anyone interested primarily in the lessons learned from the project should focus on the takeaways
provided in Section 8.
A ZTA enables secure authorized access to assets—machines, applications, and services running on
them, and associated data and resources—whether located on-premises or in the cloud, for a hybrid
workforce and partners based on an organization’s defined access policy. For each access request, ZTA
explicitly verifies the context available at access time—this includes both static user profile information
or non-person entity information, such as the requester’s identity and role; and dynamic information,
such as geolocation, the requesting device’s health and credentials, the sensitivity of the resource,
access pattern anomalies, and whether the request is warranted and in accordance with the
organization’s business process logic. If the defined policy is met, a secure session is created to protect
all information transferred to and from the resource. A real-time, risk-based assessment of resource
access and access pattern anomaly detection with continuous policy evaluation is performed to
establish and maintain the access. A ZTA can also protect organizations from non-organizational
resources that their users and applications may connect to, helping to stop threats originating from
outside of the organization’s control.
NCCoE has collaborated with ZTA technology providers to build numerous example ZTA solutions and
demonstrate their ability to meet the tenets of ZTA described in NIST SP 800-207. The goal of the
solutions is to enforce corporate security policy dynamically and in near-real-time to restrict access to
authenticated, authorized users, devices, and non-person entities while flexibly supporting a complex
set of business outcomes involving both remote and on-premises workforces, use of the cloud, partner
collaboration, and support for contractors. The example solutions are designed to demonstrate the
ability to protect against and detect attacks and malicious insiders. They showcase the ability of ZTA
products to interoperate with existing enterprise and cloud technologies while trying to minimize the
impact on end-user experience.
The project can help organizations plan how to evolve their existing enterprise environments to ZTA,
starting with an assessment of their current resources, strengths, and weaknesses, and setting
milestones along a path of continuous improvement, gradually bringing them closer to achieving the ZTA
goals they have prioritized based on risk, cost, resources, and their unique mission. The goal is to enable
organizations to thoughtfully apply ZTA controls that best protect their business while enabling them to
operate as they need to.
Each of the technology partners and collaborators participating in the project has provided descriptions
of the relevant products and capabilities they bring to this ZTA effort. The descriptions can be found in
our supplemental documentation of Collaborators and Their Contributions.
The NCCoE does not certify, validate, or endorse products or services. We demonstrate the capabilities
that can be achieved by using participants’ contributed technology. Your organization’s information
security experts should identify the products that will best integrate with your existing tools and IT
system infrastructure. Your organization can adopt this solution or one that adheres to these guidelines
entirely, or you can use this guide as a starting point for tailoring and implementing parts of a solution.
Next, we used a phased approach to develop example ZTA solutions. This approach was designed to
represent how we believe most enterprises will evolve their enterprise architecture toward ZTA, i.e., by
starting with their already-existing enterprise environment and gradually adding or adapting capabilities.
Our first implementations with minimum viable solutions were EIG deployments because the identity-
based controls provided by EIG are foundational components of ZTA. We called this phase of the project
the EIG crawl phase, which did not include cloud capabilities, and it was followed by the EIG run phase,
where we added cloud capabilities.
Given the importance of discovery to the successful implementation of a ZTA, we initially deployed it to
continuously observe the environment and use those observations to audit and validate the
documented baseline map on an ongoing basis. Because we had instantiated the baseline environment
ourselves, we already had a good initial understanding of it. However, we were able to use the discovery
tools to audit and validate what we deployed and provisioned, correlate known data with information
reported by the tools, and use the tool outputs to formulate an initial zero trust policy, ultimately
ensuring that observed network flows correlate to static policies.
The builds described in this document are examples with the understanding that there is no single
approach for migrating to ZTA that is best for all enterprises; ZTA is a set of concepts and principles, not
This section provides information on the project’s ZTA builds and the underlying architectures they
implemented.
Subjects (human users, devices, applications, servers, and other non-human entities that request
information from resources on premises or in the cloud) request and receive access to enterprise
resources via the ZTA. Human subjects are authenticated. Non-human subjects are both authenticated
and protected by endpoint security. Enterprise resources may be located on-premises or in the cloud.
An enterprise ZTA may have numerous PEPs and PDPs. For simplicity, however, Figure 3-1 limits its focus
to the interactions involving a single PDP, a single PEP, a single subject, and a single resource. The
labeled arrows in Figure 3-1 depict the high-level steps performed in support of the ZTA reference
architecture. These steps can be understood in terms of three separate processes:
SASE delivers converged network and security as a service capability, including Software-Defined Wide
Area Network (SD-WAN), Secure Web Gateway (SWG), Cloud Access Security Broker (CASB), Next
Generation Firewall (NGFW) and Zero Trust Network Access (ZTNA). SASE supports branch office,
remote worker, and on-premises secure access use cases. SASE is primarily delivered as a service and
enables zero trust access based on the identity of the device or entity, combined with real-time context
and security and compliance policies.
The example solutions implemented as part of the SDP, microsegmentation, and SASE phase also
integrated additional supporting components and features to provide an increasingly rich set of ZTA
functionalities. The general ZTA reference architecture shown in Figure 3-1, without constraint, is used
to support all builds from the SDP, microsegmentation, and SASE phase of this project.
Access to and from the ZTA lab is protected by a Palo Alto Networks Next Generation Firewall (PA-5250).
(The brick box icons in Figure 3-3 represent firewalls.) In addition to the four independent enterprises
(Enterprises 1, 2, 3, and 4) and the management and orchestration domain, the ZTA lab also includes a
branch office used only by Enterprise 1, a coffee shop that all enterprises can use, and an emulated wide
area network (WAN)/internet service provider. The emulated WAN service provider provides
connectivity among all the ZTA laboratory networks, i.e., among all the enterprises, the coffee shop, the
branch office, and the management and orchestration domain. Another Palo Alto Networks PA-5250
firewall that is split into separate virtual systems protects the network perimeters of each of the
enterprises and the branch office. The emulated WAN service provider also connects the ZTA laboratory
network to the NCCoE Site. The ZTA laboratory network has access to cloud services provided by AWS,
Azure, IBM Cloud, and Google Cloud, as well as connectivity to SaaS services provided by various
collaborators, all of which are available via the internet.
Each enterprise within the NCCoE laboratory environment is protected by a firewall and has both IPv4
and IPv6 (dual stack) configured. Each of the enterprises is equipped with a baseline architecture that is
intended to represent the typical environment of an enterprise before a zero trust deployment model is
instantiated.
The details of the baseline physical architecture of Enterprise 1, Enterprise 1 branch office, Enterprises 2,
3, and 4, the management and orchestration domain, the coffee shop, and all cloud services, as well as
the baseline software and security capabilities running on this physical architecture, are described in our
supplemental ZTA Laboratory Physical Architecture documentation.
Note that after the VMware End User Computing Division products were implemented at NCCoE,
VMware was acquired by Broadcom, and then the VMware End User Computing Division was divested
and reformed under a new entity, Omnissa LLC.
Note that after Enterprise 3’s earlier Microsoft builds were completed, the name Azure AD was changed
to Entra ID, and the name Defender for Cloud Apps was changed to Defender for Apps.
Note that after Tenable products were implemented at NCCoE, the name Tenable.ad was changed to
Tenable Identity Exposure.
Enterprise 1 Build 1 (E1B1) (EIG Crawl; Okta and Ivanti as PEs) uses products from AWS, IBM,
Ivanti, Mandiant, Okta, Radiant Logic, SailPoint, Tenable, and Zimperium. Certificates from
DigiCert are used.
Enterprise 1 Build 2 (E1B2) (EIG Run; Zscaler as PE) uses products from AWS, IBM, Ivanti,
Mandiant, Okta, Radiant Logic, SailPoint, Tenable, and Zscaler. Certificates from DigiCert are also
used.
E1B2 components consist of AWS Infrastructure as a Service (IaaS), DigiCert CertCentral, IBM
CP4S, IBM Security QRadar XDR, Mandiant MSV, Okta Identity Cloud, Okta Verify App, Radiant
Logic RadiantOne Intelligent Identity Data Platform, SailPoint IdentityIQ, Tenable.ad, Tenable.io,
Tenable NNM, Zscaler Admin Portal, Zscaler Application Connector, Zscaler Central Authority,
Zscaler Client Connector (ZCC), Zscaler Internet Access (ZIA) Public Service Edges, and Zscaler
Private Access (ZPA) Public Service Edges.
Enterprise 3 Build 2 (E3B2) (EIG Run; Microsoft and Forescout as PEs) uses products from F5,
Forescout, Mandiant, Microsoft, Palo Alto Networks, PC Matic, and Tenable. Certificates from
DigiCert are also used.
E3B2 components consist of DigiCert CertCentral, F5 BIG-IP, Forescout eyeControl, Forescout
eyeExtend, Forescout eyeSegment, Forescout eyeSight, Mandiant MSV, Microsoft AD, Microsoft
Azure AD, Microsoft Azure AD (Conditional Access), Microsoft Azure AD Identity Protection,
Microsoft Azure (IaaS), Microsoft Defender for Cloud, Microsoft Defender for Cloud Apps,
Microsoft Defender for Endpoint, Microsoft Intune, Microsoft Office 365 (SaaS), Microsoft
Sentinel, Palo Alto Networks NGFW, PC Matic Pro, Tenable.ad, Tenable.io, and Tenable NNM.
Enterprise 4 Build 3 (E4B3) (EIG Run; IBM as PE) uses products from Broadcom (with VMware
products), IBM, Mandiant, Palo Alto Networks, and Tenable. Certificates from DigiCert are also
used.
Enterprise 1 Build 3 (E1B3) (SDP; Zscaler as PE) uses products from AWS, IBM, Ivanti, Mandiant,
Okta, Radiant Logic, SailPoint, Tenable, and Zscaler. Certificates from DigiCert are also used.
E1B3 components consist of AWS Infrastructure as a Service (IaaS), DigiCert CertCentral, IBM
CP4S, IBM Security QRadar XDR, Mandiant MSV, Okta Identity Cloud, Okta Verify App, Radiant
Logic RadiantOne Intelligent Identity Data Platform, SailPoint IdentityIQ, Tenable.ad, Tenable.io,
Tenable NNM, Zscaler Admin Portal, Zscaler Application Connector, Zscaler Central Authority,
Zscaler Client Connector (ZCC), Zscaler Internet Access (ZIA) Public Service Edges, and Zscaler
Private Access (ZPA) Public Service Edges.
Enterprise 2 Build 3 (E2B3) (Microsegmentation; Cisco and Ping Identity as PEs) uses products
from Broadcom (with VMware products), Cisco Systems, IBM, Mandiant, Palo Alto Networks,
Ping Identity, Radiant Logic, SailPoint, and Tenable. Certificates from DigiCert are also used.
E2B3 components consist of Cisco Duo, Cisco Identity Services Engine (ISE), Cisco network
devices, Cisco Secure Endpoint (CSE), Cisco Secure Network Analytics (SNA), Cisco Secure
Workload, DigiCert CertCentral, IBM Security QRadar XDR, Mandiant MSV, Palo Alto Networks
NGFW, Ping Identity PingOne, Radiant Logic RadiantOne Intelligent Identity Data Platform,
SailPoint IdentityIQ, Tenable.ad, Tenable.io, Tenable NNM, VMware Workspace ONE UEM and
Access.
Enterprise 3 Build 3 (E3B3) (SDP and Microsegmentation; Microsoft and Forescout as PEs) uses
products from F5, Forescout, Mandiant, Microsoft, Palo Alto Networks, PC Matic, and Tenable.
Certificates from DigiCert are also used.
E3B3 components consist of DigiCert CertCentral, F5 BIG-IP, Forescout eyeControl, Forescout
eyeExtend, Forescout eyeSight, Forescout eyeSegment, Mandiant MSV, Microsoft AD, Microsoft
Azure AD, Microsoft Azure AD (Conditional Access), Microsoft Azure AD Identity Governance,
Microsoft Intune, Microsoft Sentinel, Microsoft Azure App Proxy, Microsoft Defender for
Endpoint, Microsoft Azure AD Identity Protection, Microsoft Defender for Identity, Microsoft
Defender for Office, Microsoft Entra Permissions Management, Microsoft Defender for Cloud
Apps, Microsoft Purview – Data Loss Prevention (DLP), Microsoft Purview Information
Protection, Microsoft Purview Information Protection Scanner, Microsoft Intune VPN Tunnel,
Microsoft Azure Arc, Microsoft Azure Automanage, Microsoft Intune Privilege Access
Workstation, Microsoft Azure Virtual Desktop Windows 365, Microsoft Defender for Cloud,
Microsoft Azure (IaaS), Microsoft Office 365 (SaaS), Palo Alto Networks NGFW, PC Matic Pro,
Tenable.io, Tenable.ad, and Tenable NNM.
Enterprise 1 Build 4 (E1B4) (SDP; Appgate as PE) uses products from AWS, Appgate, IBM, Ivanti,
Mandiant, Okta, Radiant Logic, SailPoint, Tenable, and Zimperium. Certificates from DigiCert are
also used.
E1B4 components consist of Appgate SDP Controller, Appgate SDP Gateway, Appgate SDP client,
Appgate Portal, AWS IaaS and SaaS, DigiCert CertCentral, IBM CP4S, IBM Security QRadar XDR,
Ivanti Neurons for UEM Platform, Mandiant MSV, Okta Identity Cloud, Okta Verify App, Radiant
To see which build suits your organization, you can first identify which of the ZTA approaches—EIG, SDP,
microsegmentation, or SASE—meets your organization’s requirements. You can then look at the build
Since most enterprises evolve their enterprise architecture toward ZTA, i.e., by starting with their
already-existing enterprise environment and gradually adding or adapting capabilities such as PE, you
can start by looking at the builds with the products closest to your existing environment.
Table 4-1 Mapping of Builds to Online Details Regarding Architecture Descriptions and Implementation
Instructions
Build Policy Engines/ Policy ZTA Architecture Links to Online Links to Online
Decision Points Instantiated Details: Build Details: Build
Architecture, Implementation
Technologies, and Instructions
Flow Diagrams
E1B1 Okta Identity Cloud EIG Crawl E1B1 Build E1B1 Build
Ivanti Access ZSO Architecture Implementation
Instructions
E2B1 Ping Identity Ping EIG Crawl E2B1 Build E2B1 Build
Federate Architecture Implementation
Instructions
E3B1 Azure AD (Conditional EIG Crawl E3B1 Build E3B1 Build
Access, later renamed Architecture Implementation
Entra Conditional Instructions
Access)
E1B2 Zscaler ZPA Central EIG Run E1B2 Build E1B2 Build
Authority (CA) Architecture Implementation
Instructions
E3B2 Microsoft Azure AD EIG Run E3B2 Build E3B2 Build
(Conditional Access, Architecture Implementation
later renamed Entra Instructions
Conditional Access)
Microsoft Intune
Forescout eyeControl
Forescout eyeExtend
E4B3 IBM Security Verify EIG Run E4B3 Build E4B3 Build
Architecture Implementation
Instructions
E1B3 Zscaler ZPA Central SDP E1B3 Build E1B3 Build
Authority (CA) Architecture Implementation
Instructions
5 General Findings
When deploying ZTA, the following capabilities are considered to be fundamental to determining
whether a request to access a resource should be granted and, once granted, whether the access
session should be permitted to persist:
Second, we used out-of-the-box integrations offered by the solution providers rather than performing
custom integrations. These two patterns combined do not support all the desired zero trust capabilities.
Both builds E1B1 and E3B1 were capable of authenticating and reauthenticating requesting users and
requesting endpoints and of verifying and periodically reverifying the health of requesting endpoints,
and both builds were able to base their access decisions on the results of these actions. Access requests
were not granted unless the identities of the requesting user and the requesting endpoint could be
authenticated and the health of the requesting endpoint could be validated; however, no check was
performed to authenticate the identity or verify the health of the endpoint hosting the resource.
Access sessions that are in progress in both builds are periodically reevaluated by reauthenticating the
identities of the requesting user and the requesting endpoint and by verifying the health of the
requesting endpoint. If these periodic reauthentications and verifications cannot be performed
successfully, the access session will eventually be terminated; however, neither the identity nor the
health of the endpoint hosting the resource is verified on an ongoing basis, nor does its identity or
health determine whether it is permitted to be accessed.
Neither build E1B1 nor build E3B1 was able to support resource management as envisioned in the ZTA
logical architecture depicted in Figure 3-1. These builds do not include any ZTA technologies that
perform authentication and reauthentication of resources that host endpoints, nor are these builds
capable of verifying or periodically reverifying the health of the endpoints that host resources. In
addition, when using both builds E1B1 and E3B1, devices (requesting endpoints and endpoints hosting
resources) were initially joined to the network manually. Neither of the two EIG crawl phase builds
includes any technologies that provide network-level enforcement of an endpoint’s ability to access the
network. That is, there is no tool in either build that can keep any endpoint (either one that is hosting a
resource or one that is used by a user) from initially joining the network based on its authentication
status. The goal is to try to support resource management in future builds as allowed by the
technologies used.
establishment of secure, direct access tunnels from requesting endpoints to private enterprise
resources, regardless of whether the resources are located on-premises or in the cloud, driven
by policy and enforced by PEPs
use of connectors that act as proxies for internal, private enterprise resources, enabling
resources to be accessed by authenticated, authorized users while ensuring that they are not
discoverable by or visible to others
Because there is no EPP in E1B2, there is no automatic solution to remediate an issue on the endpoint
either.
Build E1B2 also does not have a collaborator with a solution that supports the determination of
confidence level/trust scores that can integrate with Zscaler. Due to the absence of a collaborator with
this capability, Build E1B2 does not support the calculation of confidence levels/trust scores.
Build E2B1, which uses Ping Identity as its PE and PA and Ping Identity and Cisco Duo as its PEP, does not
have an EPP. Cisco Duo provides limited device health information but not the full spectrum that an EPP
would provide. Because there is no official EPP in this build, there is no automatic solution to remediate
an issue on the endpoint. An EPP for Enterprise 2 was included in a later build phase (E2B3).
When planning a ZTA implementation, organizations should ensure that all of the ZTA core and
supporting components that can integrate with each other are selected. This enables having end-to-end
ZTA with full functionality.
Build E3B2 currently supports one-way integration between Microsoft Intune and Forescout eyeExtend.
If Intune detects an endpoint out of compliance, eyeExtend can become informed of this problem by
pulling information from Intune. However, if one of Forescout’s discovery tools detects a problem with
an endpoint, there is currently no mechanism for this information to be passed from Forescout
eyeExtend to Microsoft Intune. Ideally, future integration of these products would allow Forescout
eyeExtend to inform Microsoft Intune when it detects a non-Azure AD-connected endpoint that is non-
compliant, as this would enable Intune to direct Azure AD to block sign-in from the non-compliant
endpoint. Without a mechanism for enabling Forescout eyeExtend to send endpoint compliance
information to Microsoft Intune, Azure AD does not have a way of knowing that a non-Azure AD-
connected endpoint is not compliant.
It is not unusual for a ZTA to have multiple PDPs, each of which may be integrated with one or more
different supporting components and/or PEPs. As a result, the policies that the ZTA enforces are not
centrally located. Rather, they are configured and managed in association with each of the various PDPs.
This makes it challenging to understand, articulate, and manage the ZTA’s policies as a comprehensive
whole.
In addition, the multiple PDPs that comprise a ZTA do not typically integrate with each other to share
information, so they do not have a shared understanding of what users, endpoints, or other subjects
may pose risks. For example, one PDP may be aware that an endpoint is non-compliant, whereas this
same endpoint compliance information is not available to another PDP. On the other hand, the second
PDP may be aware that the endpoint’s user may have exhibited suspicious behavior, whereas the first
PDP is not. Ideally, when a ZTA has multiple PDPs, it is desirable to have an integrated approach that
enables the PDPs to share information so that they can each be more fully informed, share a common,
consolidated understanding of risks, and make a decision based on all information available.
The SIEM and/or security orchestration, automation, and response (SOAR) components contain a wealth
of information that could prove useful to a PDP as it tries to determine whether any given access
request should be allowed or not. Ideally, the SIEM and SOAR should send this information to the PDP in
real-time, if possible, to ensure that the PDP’s access decisions are fully informed.
Ideally, data security tools should be integrated with the PDP so that the PDP can be made aware of
instances in which access requests are denied by the tools that are designed to protect data.
Additionally, risk information and user behavior analytics should be shared with the PDP to potentially
improve ZTA security.
Some zero trust SDP solutions for managing endpoints can also manage resources by installing clients
onto those resources. However, solutions that are specifically designed to manage resources should be
leveraged rather than the zero trust solutions that have the primary purpose of managing endpoints. In
some cases, the solutions that manage resources do not have out-of-the-box integration with the PDPs.
PDP integration capability should be available in these resource management solutions.
Endpoint compliance is essential for security. It is important to have tools that are capable of detecting
when an endpoint is not compliant and ensuring that the endpoint is not permitted to access resources
as a result. Furthermore, automatic solutions to remediate noncompliance issues on the endpoint
should be deployed when possible, and these should be integrated with the organization’s configuration
and patch management systems.
We deployed Mandiant MSV throughout the project’s laboratory environment to enable us to monitor
and verify various security characteristics of the builds. MSV automates a testing program that provides
visibility and evidence of how security controls are performing by emulating attackers to safely process
advanced cyberattack security content within production environments. It is designed so defenses
respond to it as if an attack is taking place within the enterprise. Virtual machines (VMs) that are
intended to operate as actors are deployed on each of the subnetworks in each of the enterprises.
These actors can be used to initiate various actions for the purpose of verifying that security controls are
working to support the objectives of zero trust. We also deployed three VMs that operate as directors,
two of which function as applications within Enterprise 1 and Enterprise 3 that are used by those
enterprises to monitor and audit their own traffic, and one of which is an overarching director that is
located within the management and orchestration domain and used by the project team to
demonstrate and audit operations that span multiple enterprises.
1. A typical MSV deployment, in which each enterprise deploys MSV as an application within its
own enterprise, uses MSV for self-auditing and testing. Each enterprise deploys a director and
multiple actors that function as applications within the enterprise, enabling the enterprise to
monitor and test its own enterprise security capabilities, verifying the protections it receives
from the ZTA and its ability to operate as expected. In this capacity, MSV is treated just like any
other application deployed within that enterprise. The components may be protected by PEPs
according to enterprise policies, and directors and actors exchange traffic over the same data
communications paths as other enterprise applications. Firewalls and policies within the ZTA
must be configured to permit the communications that the MSV components send and receive,
including traffic that is sent between actors and the director to control the actions that are
performed to test various security controls.
2. The NCCoE project team, as testers, use MSV to monitor and audit enterprise and inter-
enterprise actions. The project team deploys an overarching director and a management
backchannel connecting that director to all actors throughout the laboratory environment. This
overarching director is used as a tool to verify the security controls provided by each of the ZTAs
An MSV protective theater was also created in the lab. This is a virtualized system that allows
destructive actions to be tested without adversely impacting the enterprise deployments themselves.
For example, to understand the effects that malware might have on a specific system in one of the
enterprises, that system could be imported into the protective theater and infected with malware to
test what the destructive effects of the malware might be.
More detailed descriptions of each use case and scenario, including their preconditions; demonstration
steps; purposes; detailed tables of the various permutations of subject, ID, endpoint, and resource
attributes to be exercised; and expected outcomes are available in our supplemental documentation on
Functional Demonstrations.
Definitions of terminology used throughout the demonstration scenarios are available in our
Demonstration Terminology documentation. The terminology includes identifier, subject, endpoint, and
resource types; compliance; authentication status; access levels; user and access profiles; assumptions;
and other information that is required to fully describe the demonstration use cases.
Scenario B-1: Full/limited resource access using an enterprise endpoint – the subject is granted
full, limited, or no access to the requested resource as determined by its authentication status
and endpoint compliance status.
Scenario B-2: Full/limited internet access using an enterprise endpoint – the subject is granted
full, limited, or no access to the requested internet domain as determined by enterprise policy.
Scenario B-3: Stolen credential using an enterprise endpoint – a legitimate user’s enterprise ID
credential is stolen and is used to request access to an enterprise resource from an enterprise-
managed endpoint.
Scenario B-4: Full/limited resource access using BYOD – a subject using a bring-your-own-device
(BYOD) is granted full or limited access to the requested resource as determined by
authentication status and enterprise policy.
Scenario B-5: Full/limited internet access based on ID attributes – the subject is granted full,
limited, or no access to the requested internet domain as determined by enterprise ID profiles
and enterprise policy.
Scenario B-6: Stolen credential using BYOD – a legitimate user’s enterprise ID credential is stolen
and is used to request access to an enterprise resource from a BYOD endpoint.
Scenario B-7: Just-in-Time Access Privileges – An enterprise provisions access privileges to a
resource based on a single business process flow. Temporary privileges are granted to perform a
portion of the business process and then revoked when the process is complete.
Scenario B-8: Enterprise-ID Step-Up Authentication – A subject who already has an active access
session with a resource, requests to perform an action on that resource that requires additional
authentication checks.
Scenario C-1: Full resource access using an enterprise endpoint – the subject is granted full
access to the requested resource as determined by its endpoint compliance status.
Scenario C-2: Limited resource access using an enterprise endpoint – the subject is granted
limited access to the requested resource as determined by its endpoint compliance status.
Scenario C-3: Limited internet access using an enterprise endpoint – the subject is granted
limited access to internet domains as determined by its endpoint compliance status and
enterprise policy.
Scenario C-4: No internet access using enterprise owned endpoint – the subject is denied all
access to internet domains as determined by enterprise policy.
Scenario D-1: Full/limited resource access using an enterprise endpoint – the subject is granted
full, limited, or no access to the requested resource as determined by its authentication status
and endpoint compliance status.
Scenario D-2: Full/limited internet access using an enterprise endpoint – the subject is granted
full, limited, or no access to the requested internet domain as determined by enterprise policy.
Scenario D-3: Stolen credential using BYOD or enterprise endpoint – a legitimate user’s Other-ID
credential is stolen and is used to request access to an enterprise resource from either an
enterprise-managed endpoint or a BYOD.
Scenario D-4: Full/limited resource access using BYOD – a subject using a bring-your-own device
(BYOD) is granted full or limited access to the requested resource as determined by
authentication status and enterprise policy.
Scenario D-5: Full/limited internet access using BYOD – the subject is granted or denied access
to an internet domain as determined by enterprise policy.
Scenario D-6: Stolen credential using BYOD – a legitimate user’s Other-ID credential is stolen and
is used to request access to an enterprise resource from a BYOD endpoint.
Scenario D-7: Just-in-Time Access Privileges – An enterprise provisions access privileges to a
resource based on a single business process flow. Temporary privileges are granted to perform a
portion of the business process and then revoked when the process is complete.
Scenario D-8: Other-ID Step-Up Authentication – A subject who already has an active access
session with a resource requests to perform an action on that resource that requires additional
authentication checks.
Scenario F-1: User reauthentication fails during active session, causing the subject’s access to
the resource to be terminated.
Scenario F-2: Requesting endpoint reauthentication fails during active session, causing the
subject’s access to the resource to be terminated.
Scenario F-3: Resource reauthentication fails during active session, causing the subject’s access
to the resource to be terminated.
Scenario F-4: Compliance fails during active session, causing the subject’s access to the resource
to be terminated.
Scenario F-5: Compliance improves between requests – in this case the subject had not been
permitted to access a resource due to non-compliance of the requesting endpoint. However,
after the endpoint is brought into compliance and access to the resource is requested again,
access is granted.
Scenario F-6: Enterprise-ID Violating Data Use Policy, causing the subject’s access to the
resource to be terminated.
Scenario F-7: Other-ID Violating Data Use Policy, causing the subject’s access to the resource to
be terminated.
Scenario F-8: Enterprise-ID Violating Internet Use Policy.
Scenario F-9: Other-ID Violating Internet Use Policy, causing the subject’s access to the resource
to be terminated.
Scenario F-10: Enterprise-ID Attempting Unauthorized Access Detection and Response, Access
Queries – the enterprise detects a subject’s attempt to access an unauthorized resource and
responds by revoking access to a resource to which the subject had previously been granted
access.
Scenario F-11: Enterprise-ID Attempting Unauthorized Access Detection and Response, Ongoing
Sessions - the enterprise detects a subject’s attempt to access an unauthorized resource and
responds by terminating the user’s active, open access session with a resource.
Scenario F-12: Other-ID Attempting Unauthorized Access Detection and Response, Access
Queries - the enterprise detects a subject’s attempt to access an unauthorized resource and
responds by revoking access to a resource to which the subject had previously been granted
access.
Scenario F-13: Other-ID Attempting Unauthorized Access Detection and Response, Ongoing
Sessions - the enterprise detects a subject’s attempt to access an unauthorized resource and
responds by terminating the user’s active, open access session with a resource.
Scenario G-1: Service Calls Between Resources – both the subject and the resource are located
on enterprise-operated infrastructure (on-premises or branch).
Scenario G-2: Service Calls to Cloud-Based Resources – the subject is located on enterprise-
operated infrastructure while the resource is cloud-based.
Scenario G-3: Service Calls between Cloud-Based Resources – both the subject and the resource
are located in the cloud.
Scenario G-4: Service Calls between Containers – the subject is either in another container in a
single container runtime (e.g., Docker), in the same Kubernetes pod, or in a different Kubernetes
pod from the requested resource.
Scenario G-5: Service to Endpoint – an enterprise service attempts to access an enterprise-
managed endpoint to perform some action (e.g., maintenance, reconfiguration, etc.).
Cloud-based,
Stolen Credential,
Just-in-Time Access Privileges,
Enterprise-ID Step-Up Authentication,
Federated-ID Access,
Table 6-1 Mapping of Builds to Online Details Regarding Architecture Descriptions and Functional
Demonstration Results
Build Policy Engines/ Policy ZTA Architecture Links to Online Links to Online
Decision Points Instantiated Details: Build Details: Full
Architecture, Demonstration
Technologies, and Results
Flow Diagrams
E1B1 Okta Identity Cloud EIG Crawl E1B1 Build E1B1 Full
Ivanti Access ZSO Architecture Demonstration
Results
E2B1 Ping Identity Ping EIG Crawl E2B1 Build E2B1 Full
Federate Architecture Demonstration
Results
E3B1 Azure AD (Conditional EIG Crawl E3B1 Build E3B1 Full
Access) Architecture Demonstration
Results
E1B2 Zscaler ZPA Central EIG Run E1B2 Build E1B2 Full
Authority (CA) Architecture Demonstration
Results
E3B2 Microsoft Azure AD EIG Run E3B2 Build E3B2 Full
(Conditional Access) Architecture Demonstration
Microsoft Intune Results
Forescout eyeControl
Forescout eyeExtend
E4B3 IBM Security Verify EIG Run E4B3 Build E4B3 Full
Architecture Demonstration
Results
E1B3 Zscaler ZPA Central SDP E1B3 Build E1B3 Full
Authority (CA) Architecture Demonstration
Results
By protecting each resource individually and employing extensive identity, authentication, and
authorization measures to verify a subject’s requirement to access each resource, zero trust can ensure
that authorized users, applications, and systems have access to only those resources that they
absolutely have a need to access in order to perform their duties, not to a broad set of resources that all
happen to be within the network perimeter. This way, if a malicious actor does manage to gain
In addition, once a subject is granted access to a resource, this access is often permitted to continue for
a substantial period of time without being reevaluated based on a defined policy. The access session is
often not monitored or subject to behavioral analysis, and the configuration and health of the devices
being used to access resources may be subject to initial, but not ongoing, scrutiny. So, if a subject does
manage to gain unauthorized access to a resource, the subject often has ample time to exfiltrate or
modify valuable information or further compromise the resource and/or use it as a point from which to
pivot and attack other corporate resources. ZTA limits these threats by performing continual verification
of a subject’s identity and authorization to access a resource. It may also perform behavioral analysis
and validation of each system’s health and configuration, and consider other factors such as day, time,
and location of subject and resource. Based on the organization’s defined policy, ZTA makes dynamic,
ongoing assessments of the risk of each access request in real-time to ensure it poses an acceptable
level of risk.
A number of trends, including cloud computing and remote work, have also introduced additional
security threats. The growth in cloud computing has meant that enterprises are now storing critical
resources (e.g., databases, applications, servers) in the cloud (i.e., outside of the traditional network
perimeter) as well as on-premises. As a result, these resources cannot be protected by the network
perimeter strategy. A new protection paradigm is needed that focuses on protecting resources
individually, no matter where they are located, so that they are not at risk of being subjected to security
policies that are not under organization control or not enforced consistently across all enterprise
resources. Often the clouds in which resources are hosted are multitenant, meaning that different
enterprises have authorized access to their own portions of the cloud infrastructure, with each tenant
reliant on the cloud service provider to enforce this separation. If a malicious actor were to figure out
how to subvert cloud security and move from one tenant’s account to the next, the organization’s
resources would be at risk. Use of ZTA to protect each resource individually serves as further assurance
that the resources will not be accessible to cloud users from other enterprises, nor will they be
accessible to users from within the enterprise who do not have a need to access them.
The growth of the remote workforce, as well as collaboration with partners and dependence on
contractors are other trends that are also challenging the conventional security paradigm. The subjects
requesting authorized access to resources may not necessarily be within the network perimeter. They
may be employees working from home or from a coffee shop’s public Wi-Fi via the internet, or a
partner, contractor, customer, or guest that requires access to some resources but must be restricted
from accessing other resources. By relying on strong identity, authentication, and authorization services
to determine precisely which resources a subject is authorized to access with respect to their role in or
relationship to the organization, ZTA can restrict subjects to accessing only those resources that they
have a need to access and ensure that they are not permitted to access any other resources.
Three categories of ZTA Security Mappings are available in our supplemental documentation:
Subcategories from the NIST Cybersecurity Framework 1.1 (CSF 1.1) [2] and The NIST
Cybersecurity Framework 2.0 (CSF 2.0) [3]. Note that mapping for CSF 1.1 was done only for the
builds that were implemented before CSF 2.0 was finalized. Mapping for CSF 2.0 is done for all
builds.
Security controls from NIST SP 800-53r5 (Security and Privacy Controls for Information Systems
and Organizations) [4].
NIST critical software security measures.
These mappings describe how the functions in our ZTA reference design are related to the NIST
reference documents within the context of our ZTA reference design. Within each category of mapping,
there is both a general mapping from the ZTA reference design logical components to the document
being mapped to (i.e., CSF, SP 800-53, or NIST critical software security measures), as well as a set of
collaborator-specific mappings from the ZTA technology component capabilities that are included in one
or more project builds to the document being mapped to (CSF, SP 800-53, or NIST critical software
security measures).
1. Why should organizations implement ZTA? This use case identifies how implementing ZTA can
support an organization with achieving CSF Subcategories, SP 800-53 controls, and NIST critical
software security measures. This helps communicate to an organization’s senior management
that expending resources to implement ZTA can also aid in fulfilling other security requirements.
2. How can organizations implement ZTA? This use case identifies how an organization’s existing
implementations of CSF Subcategories, SP 800-53 controls, and NIST critical software security
measures can help support a ZTA implementation. An organization wanting to implement ZTA
might first assess its current security capabilities so that it can plan how to add missing
capabilities and enhance existing capabilities in order to implement ZTA. Organizations can
leverage their existing security investments and prioritize future security technology
deployment to address the gaps.
These mappings are intended to be used by any organization that is interested in implementing ZTA or
that has begun or completed a ZTA implementation.
Discovery tools that are used to identify organization resources may do so, for example, by monitoring
transaction flows and communication patterns. These tools may also be useful in helping the
organization identify the business and access rules that are currently being enforced and in identifying
access patterns that business operations require. Understanding how resources are accessed, by whom,
and in what context will help the organization formulate its access policies. In addition, once the
organization has begun deploying a ZTA, continuing to use the discovery tools to observe the
environment can be helpful to the organization as it audits and validates the ZTA on an ongoing basis.
Initially, an organization may not have a clear sense of what resources each employee needs to access.
They may not be aware of which employees are accessing which resources or whether or not such
access conforms to the principles of least privilege and separation of duties. Information provided by the
tools that were used to discover resources can be useful in this regard. They can monitor access patterns
and produce a list of access flows and patterns that are observed. For the remote access example, an
organization transitioning from a full device VPN to per-app tunneling could first set up a full device
tunnel and observe traffic, then begin enabling only the traffic that is required for the user profile. The
organization’s security team can then examine this list to determine which access flows should be
permitted and then formulate access rules that permit them. Any observed access flows that should not
be permitted may be denied by default or explicitly prohibited in the access policy. By basing access
policy on observed access patterns, an organization reduces the chances that it will create overly
restrictive policies that interfere with its ability to conduct normal operations. By taking into
consideration the criticality of the data being protected when formulating the access policy, an
organization can help ensure that the protections being provided to a resource are commensurate with
its value.
One challenge that organizations may have when formulating policy is that their ZTA may consist of
numerous components that each perform policy engine and policy administrator roles. As a result,
access policy may not be centralized; rules may be distributed across numerous products, i.e., with some
rules configured in an endpoint protection component; some configured in ICAM components; other
rules configured in a network security component; and still other rules configured in a data security
component or other components. The lack of a single location where all policy rules can be centralized
may make it challenging for an organization to maintain an organized, complete, consistent
understanding of its access policy. To help manage their access policies, organizations should explicitly
keep track of not only what their access rules are but also where each of the rules is configured.
An organization should identify and inventory its existing security technology components and
capabilities to understand what protections they already provide, then determine whether these
components should continue to provide these protections as part of the deployed ZTA or should be
repurposed. To save money, an organization will want to continue to use or repurpose as much of its
existing technology as possible without sacrificing security. Continuing to use existing technology will
require the organization to understand what potential zero trust components and products its existing
security technology will integrate with. Any additional components that are purchased specifically for
deployment in the ZTA should, ideally, integrate with the security technology components that the
organization already has and plans to continue to use.
8.4 Eliminate Gaps in Zero Trust Policy and Processes by Applying a Risk-
Based Approach Based on the Value of Data
Once an organization has inventories of the resources it needs to protect and the security capabilities it
already has, the organization is ready to begin planning its access protection topology, in terms of
whether and where its infrastructure will be segmented and at what level of granularity each resource
will be protected. The access topology should be designed using a risk-based approach, isolating critical
resources in their own trust zones protected by a PEP but permitting multiple lower-value resources to
share a trust zone. In designing its access protection topology, the organization will identify which PEP is
responsible for protecting each resource as well as what supporting technologies will be involved in
providing input to resource access decisions.
Initially, the organization’s network may not be well-segmented. In fact, before zero trust is
implemented, when the organization is still relying on perimeter-based protections, such a topology can
be thought of as the organization protecting all of its resources behind a single PEP, i.e., the perimeter
firewall. As the organization implements ZTA, it should segment its infrastructure into smaller parts.
Such segmentation will enable it to limit the potential impact of a breach or attack and make it easier to
monitor network traffic. In designing its access protection topology, the organization should apply
access control enforcement at multiple levels: application, host, and network.
a good understanding of its current environment in terms of the resources it needs to protect
and the security capabilities that it already has deployed;
formulated the access policies that are appropriate to support its mission and business use
cases; and
designed its access protection topology to identify the granularity at which access to various
resources will be protected and the supporting technologies that will provide input to the PDP.
Given the importance of discovery to the successful implementation of a ZTA, the organization may
begin by deploying tools to continuously monitor the environment, if it has not done so already. The
organization can use these observations to audit and validate the ZTA on an ongoing basis.
In addition to discovery tools, the organization should ensure that any other baseline security tools such
as SIEMs, vulnerability scanning and assessment tools, and security validation tools are operational and
configured to log, scan, assess, and validate the ZTA components that will be deployed. Having security
baseline tools in place before the organization begins deploying new ZTA components helps ensure that
the ZTA rollout will be well-monitored, enabling the organization to proceed with high confidence that it
will understand the security ramifications of the incremental deployment as it proceeds.
Identity, authentication, and authorization are critical to making resource access decisions. Given that
making and enforcing access decisions are the two main responsibilities of a ZTA, the organization will
want to use its existing or a new ICAM solution as a foundational building block of its initial ZTA
implementation. The organization should strongly consider implementing MFA in a risk-based manner
for its users. An endpoint protection or similar solution that can assess device health and that integrates
with the ICAM solution may also be another foundational component of an initial ZTA deployment. An
initial ZTA based on these two main components will be able to use the identity and authorizations of
subjects and the health and compliance of requesting endpoints as the basis for making access
decisions. Additional supporting components and features can then be deployed to address an
increasing number of ZTA requirements. Which types of components are deployed and in what order
will depend on the organization’s mission and business use cases. If data security is essential, then data
security components will be prioritized; if behavior-based anomaly detection is essential, then
monitoring and AI-based analytics may be installed. The ZTA can be built incrementally, adding and
integrating more supporting components, features, and capabilities to gradually evolve to a more
comprehensive ZTA.
In addition, the ZTA may need to adapt to a changing threat landscape. As new types of adversary
attacks become known and prevalent, the ZTA will need to add the threat signatures for these attacks to
the list of things it monitors for. Ideally the ZTA will also perform behavior-based monitoring that
enables it to detect anomalies that may signal zero-day attacks for which threat signatures are not yet
known. Behavior-based monitoring tools provide the ZTA with some degree of agility and readiness with
respect to its ability to detect attacks by adversaries who are constantly changing their tactics and
techniques. In any case, as the threat landscape changes, the organization’s CISO and security team
need to continually assess the ZTA’s topology, components, and policies to ensure that they are best
designed to address newly emerging threats. If the value of one or more of an organization’s resources
increases substantially, the organization may want to change how that resource is protected by the ZTA,
as well as what its access policies are.
As input to this ongoing process of validation and improvement, organizations should continuously
monitor their network and other infrastructure and update policies, technologies, and network
segmentation topologies to ensure that they remain effective. Creating a ZTA is not a one-time project
but an ongoing process. The organization’s CISO or other security team members should perform
ongoing validation of their ZTA access policies to ensure that they continue to be defined in a manner
that supports the organization’s mission and business use cases while conforming with the principles of
least privilege and separation of duties.
[2] National Institute of Standards and Technology (2018) Framework for Improving Critical
Infrastructure Cybersecurity, Version 1.1. (National Institute of Standards and Technology,
Gaithersburg, MD), NIST Cybersecurity White Paper (CSWP) NIST CSWP 6.
https://doi.org/10.6028/NIST.CSWP.6
[3] National Institute of Standards and Technology (2024) The NIST Cybersecurity Framework (CSF)
2.0. (National Institute of Standards and Technology, Gaithersburg, MD), NIST Cybersecurity
White Paper (CSWP) NIST CSWP 29. https://doi.org/10.6028/NIST.CSWP.29
[4] Joint Task Force Interagency Working Group (2020) Security and Privacy Controls for
Information Systems and Organizations. (National Institute of Standards and Technology,
Gaithersburg, MD), NIST Special Publication (SP) NIST SP 800-53, Rev. 5.
https://doi.org/10.6028/NIST.SP.800-53r5
[8] “National Cybersecurity Center of Excellence (NCCoE) Zero Trust Cybersecurity: Implementing a
Zero Trust Architecture,” Federal Register Vol. 85, No. 204, October 21, 2020, pp. 66936-66939.
Available: https://www.federalregister.gov/documents/2020/10/21/2020-23292/national-
cybersecurity-center-of-excellence-nccoe-zero-trust-cybersecurity-implementing-a-zero-trust.
In December 2024, the following changes were made for the practice guide’s initial public draft:
Introduced a new manner of content delivery in two formats, one we refer to as the “High-Level
Document in PDF Format” and the other as the “Full Document in Web Format.”
Added builds E2B4, E3B4, E4B4, E1B5, E2B5, E3B5, and E1B6
In July 2023, the following changes were made for the practice guide’s third preliminary draft: