2020
DOI: 10.6028/nist.sp.800-207-draft2
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Zero Trust Architecture

Abstract: This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercis… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 75 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…In a further study conducted in, 2020, Rose et al [18] provided a comprehensive summary of the prevailing fundamental ZTA schemes. Additionally, they put forth the essential logical components that constitute the ZTA.…”
Section: Related Work Of Zero Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…In a further study conducted in, 2020, Rose et al [18] provided a comprehensive summary of the prevailing fundamental ZTA schemes. Additionally, they put forth the essential logical components that constitute the ZTA.…”
Section: Related Work Of Zero Trustmentioning
confidence: 99%
“…By adhering to the zero trust principle, this approach strengthens the security of enterprises functioning in cloud computing environments and efficiently reduces the risk of unauthorized fingerprinting of protected resources. Rose et al [18] 2020 Authors placed greater emphasis on the execution of ZTA, with a particular focus on achieving the realization of ZTA Authors put forth the essential logical components that constitute the ZTA. Furthermore, the author placed greater emphasis on the execution of ZTA, with a particular focus on achieving the realization of ZTA.…”
Section: Related Work Of Zero Trustmentioning
confidence: 99%