Announcing Tetrate Agent Operations Director for GenAI Runtime Visibility and Governance

Learn more
< Back

NIST SP 800-207A Explained: A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments

New Guidance for Federal Agencies Achieving a Zero Trust architecture (ZTA) is a key goal for many enterprises and government agencies today. In fact,

NIST%20SP%20800-207A%20Explained%3A%20A%20Zero%20Trust%20Architecture%20Model%20for%20Access%20Control%20in%20Cloud-Native%20Applications%20in%20Multi-Cloud%20Environments

New Guidance for Federal Agencies

Achieving a Zero Trust architecture (ZTA) is a key goal for many enterprises and government agencies today. In fact, the Executive Order 14028 (EO 14028) on Improving the Nation’s Cybersecurity pushes agencies to adopt zero trust cybersecurity principles and adjust their network accordingly by 2024. Zero Trust Architecture is a crucial security framework that addresses the challenges posed by the evolving threat landscape, remote work, cloud adoption and compliance requirements. By adopting ZTA, organizations can enhance their security posture, reduce risk and better protect their valuable assets and data. 

NIST Special Publication 800-207A, entitled A Zero Trust Architecture (ZTA) Model for Access Control in Cloud-Native Applications in Multi-Cloud Environments, provides a comprehensive overview of the fundamental principles and concepts of Zero Trust Architecture at runtime. Runtime ZTA provides a dynamic and adaptive approach to security, ensuring that trust is continuously verified, reducing the attack surface and mitigating the evolving threats posed by remote work, cloud adoption and the dissolution of traditional perimeters. Runtime ZTA also reduces the attack surface by segmenting the network and applying access controls based on identity, device health and context. This limits lateral movement for attackers who manage to breach one part of the network. Most importantly, runtime ZTA, enables adaptive security allowing organizations to dynamically adjust security policies based on real-time risk assessments and changing conditions. 

The objective of recently published NIST SP 800-207A, co-authored by Tetrate’s founding engineer Zack Butcher and Ramaswamy Chandramouli, Sr. Computer Scientist at NIST is to provide guidance for realizing an architecture that can enforce granular application-level policies while meeting the runtime requirements of ZTA for multi-cloud and hybrid environments.

Key Points Covered in SP 800-207A

  • Introduction to Zero Trust: The publication introduces the Zero Trust concept and its importance in modern cybersecurity. It highlights the need for organizations to adopt a more proactive and adaptive security approach in the face of evolving threats.
  • Zero Trust Principles: NIST outlines the core principles of ZTA, which include verifying identity, monitoring and controlling access and securing resources and assets through micro-segmentation.
  • The Evolving Security Perimeter: The document discusses the limitations of traditional perimeter-based security and how it has become inadequate for addressing contemporary cybersecurity challenges, such as remote work and cloud computing.
  • Continuous Verification: ZTA emphasizes the continuous monitoring and verification of users, devices and applications, regardless of their location or network access method.
  • Micro-Segmentation: Micro-segmentation involves dividing an organization’s network into smaller segments with unique access controls. NIST explains how this approach enhances security and reduces the attack surface.
  • Identity-Centric Security: ZTA is identity-centric, focusing on user and device identities rather than network locations. The publication highlights the importance of strong identity and access management.
  • Trust Assessment: NIST SP 800-207A covers the concept of trust assessment and how organizations can assess the trustworthiness of users, devices and applications.
  • Implementing ZTA: The document provides guidance on implementing Zero Trust Architecture, including practical steps and considerations for organizations looking to adopt ZTA principles.
  • Use Cases: It offers real-world use cases and scenarios where ZTA can be applied to enhance security.

Additional Resources

NIST SP 800-207A is a valuable resource for organizations and security professionals seeking to understand and implement the principles of Zero Trust Architecture. It provides a solid foundation for improving cybersecurity strategies and adapting to the evolving threat landscape. 

For a deeper dive into NIST SP 800-207A and a better understanding of the core principles and the rationale behind them, you can watch Zack and Mouli on demand webinar – Zero Trust at Runtime: An Update on NIST 800-207A. Additionally, Zack discusses using the service mesh to put 207A and ZTA into action in multi–cloud environments. To get further insight into how  Tetrate Service Bridge (TSB) – Tetrate’s implementation of the powerful Istio open-source project, – streamlines policy management and actions 207A recommendations for zero trust at runtime, read the white paper.

Product background Product background for tablets
New to service mesh?

Get up to speed with free online courses at Tetrate Academy and quickly learn Istio and Envoy.

Learn more
Using Kubernetes?

Tetrate Enterprise Gateway for Envoy (TEG) is the easiest way to get started with Envoy Gateway for production use cases. Get the power of Envoy Proxy in an easy-to-consume package managed via the Kubernetes Gateway API.

Learn more
Getting started with Istio?

Tetrate Istio Subscription (TIS) is the most reliable path to production, providing a complete solution for running Istio and Envoy securely in mission-critical environments. It includes:

  • Tetrate Istio Distro – A 100% upstream distribution of Istio and Envoy.
  • Compliance-ready – FIPS-verified and FedRAMP-ready for high-security needs.
  • Enterprise-grade support – The ONLY enterprise support for 100% upstream Istio, ensuring no vendor lock-in.
  • Learn more
    Need global visibility for Istio?

    TIS+ is a hosted Day 2 operations solution for Istio designed to streamline workflows for platform and support teams. It offers:

  • A global service dashboard
  • Multi-cluster visibility
  • Service topology visualization
  • Workspace-based access control
  • Learn more
    Decorative CTA background pattern background background
    Tetrate logo in the CTA section Tetrate logo in the CTA section for mobile

    Ready to enhance your
    network

    with more
    intelligence?