This resource is no longer available
The increasing frequency and sophistication of cybersecurity attacks on federal agencies has led to an unfortunate truth: Organizations can no longer wholly trust users, devices or applications on their networks.
This lack of implicit trust is the concept behind the increasingly popular zero-trust movement, built on a few guiding principles which include:
- Security threats always exist within the network
- All users, devices and applications need to be authenticated
- Location is not an adequate basis for trust
This guide goes in further detail into the zero-trust model and offers recommendations for zero-trust adoption within federal agencies. Read on to get started.