blog and NIST 800-207 Zero Trust Architecture Compliance

Check out our latest whitepaper which provides a high-level overview of how our zero trust platform matches up with NIST 800-207’s zero trust architecture criteria!

Today’s enterprise IT environment is incredibly complex, supporting countless systems, data, networks, and users across multiple environments in multiple configurations. This delicate balance enables the enterprise to deliver newer, better capabilities to its customers faster than ever before. But the speed and density of today’s modern IT enterprise ops environment can also strain existing security models, introducing potential vulnerabilities. Before, the enterprise could rely on simple boundary security, the “hard candy shell” which contained the gooey center of systems, networks, and data. Now, because of the interconnectedness of today’s distributed systems threats can exist throughout the network, at every level.

Enter Zero Trust Architecture

Zero Trust Architecture (ZTA) is based on the principle that nothing can be trusted, a philosophy in which no device, user, or application attempting to interact with your architecture can be considered secure by default. Zero trust is not a system you can buy, but rather a set of best practices designed to limit vulnerabilities, mitigate incident impacts, and introduce modern access control and policy management across the enterprise.

The National Institute of Standards and Technology (NIST) released NIST Special Publication 800-207, Zero Trust Architecture to help codify these best practices. This critical document outlines the core logical components and paradigms of ZTA. It serving as a guidepost for the adoption of zero trust security throughout federal government agencies. It is just as valuable a guide for enterprise business. is Built With NIST 800-207 Criteria at Its Core

Our technologists recently conducted an in-depth mapping exercise to compare our enterprise microservices platform’s ZTA capabilities against the full list of NIST 800-207 specifications. The resultant findings, published in our most recent whitepaper indicate that our platform is fully compliant with 92% of all 76 NIST criteria, and at least partially compliant with the rest!

Our whitepaper provides a high-level overview of our platform’s compliance with NIST 800-207’s established criteria, explaining how our security-centric design and implementation can deliver zero trust security to your enterprise.

Click here to read the full report!

Read Previous Post
Read Next Post