Date Published: July 19, 2023
Comments Due: September 4, 2023 (public comment period is CLOSED)
Email Questions to:
nccoe-zta-project@list.nist.gov
The Zero Trust Architecture (ZTA) team at NIST's National Cybersecurity Center of Excellence (NCCoE) has published the third version of volumes B and C of a preliminary draft practice guide titled "Implementing a Zero Trust Architecture” and is seeking the public's comments on their contents.
This guide summarizes how the NCCoE and its collaborators are using commercially available technology to build interoperable, open standards-based ZTA example implementations that align to the concepts and principles in NIST Special Publication (SP) 800-207, Zero Trust Architecture.
The updated versions of volumes B and C describe ten ZTA implementations, demonstrating how blends of commercially available technologies can be integrated and brought into play to build various types of ZTAs. We will continue to update the volumes of NIST SP 1800-35 appropriately as needed as we make significant progress on the project.
As an enterprise’s data and resources have become distributed across the on-premises environment and multiple clouds, protecting them has become increasingly challenging. Many users need access from anywhere, at any time, from any device. The NCCoE is addressing these challenges by collaborating with industry participants to demonstrate several approaches to a zero trust architecture applied to a conventional, general-purpose enterprise IT infrastructure on-premises and in the cloud.
Access Control; Identification and Authentication; Risk Assessment; System and Communications Protection
Publication:
NIST SP 1800-35B 3prd (pdf)
NIST SP 1800-35C 3prd (pdf)
Supplemental Material:
NIST SP 1800-35A 2prd (pdf)
NIST SP 1800-35D 2prd (pdf)
NIST SP 1800-35E iprd
Project homepage
Comment template (xlsx)
Document History:
08/09/22: SP 1800-35 (Draft)
07/19/23: SP 1800-35 (Draft)
08/22/23: SP 1800-35 (Draft)
07/31/24: SP 1800-35 (Draft)
12/04/24: SP 1800-35 (Draft)
access authorization, access control, authentication, security controls, zero trust
Technologies Applications Laws and Regulations