In 2020, NIST released special publication 800-207 called Zero Trust Architecture or ZTA. It mentioned specifically seven tenets stating, “A zero trust architecture is designed and deployed with adherence to the following zero trust basic tenets”.
A few take-aways from this list is that in ZTA, everything is a resource. This means that for every resource, the lowest level of access and data must be secured, encrypted, monitored and controlled.
Another important point is that when access is granted in a ZTA network, it is the least amount of access required and sessions are kept to a minimal time; no more blanket authorizations.
Since in ZTA we acknowledge that at any time anything can be compromised, any observable issue in trust will require re-authentication by the user to the asset. For ZTA to be effective businesses are required to continuously monitor access and look for indicators that might imply trust should be revoked.
This is why it is imperative for businesses to have continuous monitoring, and event alerting mechanisms in place to identify potential unwanted access and connections to their business environments.
NIST SP 800-207 can be reviewed in its entirety here: https://csrc.nist.gov/publications/detail/sp/800-207/final
Contact us to learn more about how you can implement a Zero Trust Architecture and help secure your business from unwanted access.