NIST Releases New Guide - 19 Strategies for Building Zero Trust Architectures
gbhackers
- Policy Engine: Decides access using contextual data (user identity, device health, behavior analytics)
- Policy Administrator: Enforces engine decisions through API-driven controls
- Continuous Monitoring: Leverages tools like Security Information and Event Management (SIEM) for real-time threat detection
json// Example Policy Engine Decision Logic
{
"user": "admin@corp",
"device": {
"os": "Windows 11",
"patch_level": "2025-05",
"encryption": true
},
"request": {
"resource": "sensitive_db",
"action": "write",
"location": "coffee_shop_wifi"
},
"decision": "DENY",
"reason": "Unsecured network context"
}
Implementation Models and Technical Frameworks
The guidance categorizes ZTA deployments into five architectural patterns, each addressing specific enterprise needs:
Implementation Type
Key Technologies
Use Case
Enhanced Identity Governance (EIG Crawl)
ICAM, Endpoint Protection Platforms (EPP)
On-premises resource protection
Software-Defined Perimeter (SDP)
Cloudflare Access, Zscaler Private Access
Secure remote access
Microsegmentation
VMware NSX, Cisco ACI
Data center network isolation
Secure Access Service Edge (SASE)
Netskope, Palo Alto Prisma
Branch office security
Hybrid Cloud ZTA
AWS IAM, Azure Policy, Google BeyondCorp ...
Copyright of this story solely belongs to gbhackers . To see the full text click HERE