NIST Zero Trust Architecture refers to cybersecurity policies and best practices developed by the National Institute of Standards and Technology (NIST). In the Special Publication 800-207 and 800-207A series, NIST establishes the standards of Zero Trust as an approach to security focused on users, assets, and resources instead of static, network-based perimeters. With Zero Trust, no implicit trust is granted to anyone attempting to access the network, regardless of location.
The National Institute of Standards and Technology bases their concept of Zero Trust on the following five principles.
- Granting the least access privilege based on user roles and responsibilities.
- Segmenting & isolating networks using microsegmentation and identity-based segmentation to limit lateral attacks and additional breaches within the network infrastructure.
- Continually monitoring and verifying network traffic, user behavior and resource health and feeding that back into continuously improving security policy. More advanced approaches include using AI-enhanced analytics to recognize, predict and learn from certain patterns.
- Multi-factor authentication practices to determine and verify user identities, locations, and privileges.
- Automating security processes, including threat mitigation, monitoring, alerts and incident responses.
Tetrate helps organizations adhere to NIST standards by implementing a Zero Trust approach across endpoints, apps, networks, and data in transit while maintaining the highest levels of security.
- Enable zero trust at scale: Remove all implicit trust. Continually validate each stage of digital interaction.
- Simplify infrastructure: Advance digital transformation by reducing overall security complexity.
- Gain visibility & control: Get a bird’s eye view of application traffic in order to respond faster and more effectively to threats.
- Strengthen your cyber resilience policies & procedures: Limit and prevent attacks, improve response time and mitigate breaches and prevent intruders from pivoting to critical systems.