NIST Offers 19 Ways to Build Zero Trust Architectures

nist

View as a Web Page

News

NIST Offers 19 Ways to Build Zero Trust Architectures

Icons for head office, remote worker’s office, coffee shop, and data center are arranged around the words Zero Trust Architecture.

If you’re trying to secure your organization’s computer network from cyberattacks, traditional approaches may not work. Gone are the days when you could keep all your electronic assets inside a single building and construct a firewall between them and the wider internet. Now you have remote workers logging in from distant cities and cloud-based software applications running elsewhere in a data center. You’ve heard that your best bet for protecting all these far-flung assets is to create a zero trust architecture (ZTA), which assumes that no user or device can be trusted, regardless of its location or previous verification. 

So how do you start?  

Read More

IN CASE YOU MISSED IT

Illustration shows a website with https:// at the top and and the NIST TLS 1.3 Visibility Practice Guide on the screen.

New NCCoE Guide Helps Major Industries Observe Incoming Data While Using Latest Internet Security Protocol

Jan. 30, 2024
The new draft practice guide can help companies in key industries use TLS 1.3 while performing required audits on incoming internet traffic.

Read More