NSA Issues Zero Trust Guidelines for Network Security

By

The document aims to improve security through Zero Trust principles.

The National Security Agency (NSA) has released a Cybersecurity Information Sheet (CSI) with recommendations for strengthening internal network control and containing network intrusions using Zero Trust principles.

The Advancing Zero Trust Maturity Throughout the Network and Environment Pillar document aims “to arm network owners and operators with the processes they need to vigilantly resist, detect, and respond to threats that exploit weaknesses or gaps in their enterprise architecture,”

says NSA Cybersecurity Director Rob Joyce.

The concepts covered in the document “provide guidance on enhancing existing network security controls to limit the potential impact of a compromise through data flow mapping, macro and micro segmentation, and software-defined networking.”

Read more at NSA.
 
 
 

 
 
 

03/18/2024

Related content

  • NSA Issues Zero Trust Guidance on Automation and Orchestration
  • Zero trust planning and implementation
    The many facets of the zero trust implementation process can be a source of frustration, which is why we offer a step-by-step guide to implementing zero trust models to help you make state-of-the-art IT security become a reality.
  • News for Admins
    In the news: DHS Releases New Guidelines for Securing Critical Infrastructure; Datadog Report Examines DevSecOps Best Practices; Upskilling Key to Tech Staffing Challenges, Says LF Survey; 2024 Open Source Pros Job Survey Report Released; OpenSSF Issues Guidance to Help Prevent Social Engineering Attacks; Black Duck Supply Chain Edition Released by Synopsys; Spectra Logic Announces New Tape Libraries and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security; and NIST Releases Major New Version of Cybersecurity Framework.
  • Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure
  • Zero Trust as a security strategy
    Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles of modern zero trust concepts.
comments powered by Disqus