Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

NIST SP 800-207 (2nd Public Draft)

Zero Trust Architecture

Date Published: February 2020
Comments Due: March 13, 2020 (public comment period is CLOSED)
Email Questions to: zerotrust-arch@nist.gov

Author(s)

Scott Rose (NIST), Oliver Borchert (NIST), Stu Mitchell (Stu2Labs), Sean Connelly (DHS)

Announcement

Zero trust refers to an evolving set of network security paradigms that narrows defenses from wide network perimeters to individual resources. Its focus on protecting resources rather than network segments is a response to enterprise trends that include remote users and cloud-based assets that are not located within an enterprise-owned network boundary.

NIST invites comments on a second draft of NIST Special Publication (SP) 800-207, Zero Trust Architecture, which discusses the core logical components that make up a zero trust architecture (ZTA) network strategy. This second draft publication builds upon the first draft with a new section on zero trust approaches as well as updates to material based on public comments.

When recording and submitting your comments, we encourage you to use the provided comment template.

NOTE: A call for patent claims is included on page iv of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy--Inclusion of Patents in ITL Publications

Abstract

Keywords

architecture; cybersecurity; enterprise; network security; zero trust
Control Families

None selected

Documentation

Publication:
https://doi.org/10.6028/NIST.SP.800-207-draft2
Download URL

Supplemental Material:
Comment template (xlsx)

Document History:
09/23/19: SP 800-207 (Draft)
02/13/20: SP 800-207 (Draft)
08/11/20: SP 800-207 (Final)

Topics

Security and Privacy

identity & access management, risk management, zero trust

Technologies

networks

Applications

enterprise