Zero Trust Compliance for Everyone

白皮書

Zero Trust Compliance for Everyone

 

 Leveraging cloud-based identity and VPN services to overcome remote use ZTA compliance challenges

 

 Security policy planning for remote work whether agency user or contractor can be complex. Proper planning requires careful consideration of each individual posture. This becomes exponentially more difficult when assessment over time identifies an exhausting number of postures that need to be addressed. This can lead to generalized policy application that is at risk of being too strict or too lenient, adversely impacting productivity or increasing potential compromise. What if there was a way to implement zero trust for remote users that mitigates the challenge with diversity of postures to focus on eliminating policy gaps? The first step is the selection of ZTA architecture variations to be used to address the challenge of securing the network regardless of resource location. NIST 800-207 outlines two architectures that will influence the remote use case design.