June 30, 2022

Volume XII, Number 181

Advertisement
Advertisement

June 29, 2022

Subscribe to Latest Legal News and Analysis

June 28, 2022

Subscribe to Latest Legal News and Analysis

June 27, 2022

Subscribe to Latest Legal News and Analysis
Advertisement

What Are You Doing for Zero Trust Architecture?

NIST published the Special Publication 800-207 which “defines zero trust as a set of cybersecurity principles used when planning and implementing an enterprise architecture. These principles apply to endpoints, services, and data flows. Input and cooperation from various stakeholders in an enterprise is needed for a zero trust architecture to succeed in improving the enterprise security posture.” The May 6, 2022 White Paper is entitled “Planning for a Zero Trust Architecture: A Planning Guide for Federal Administrators” which included these comments:

Zero trust provides a collection of concepts designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as contested.

That is, there may be a malicious actor on the network that can intercept or initiate communication.

Zero trust is fundamentally comprised of a set of principles upon which information technology architectures are planned, deployed, and operated.

Zero trust uses a holistic view that considers potential risks to a given mission or business process and how they are mitigated.

As such, there is no single specific zero trust infrastructure implementation or architecture.

Zero trust solutions depend on the workflow (i.e., part of the enterprise mission) being analyzed and the resources that are used in performing that workflow.

Zero trust strategic thinking can be used to plan and implement an enterprise IT infrastructure, this plan is called a zero trust architecture (ZTA).

Of course this for Federal Administrators…what about your non-government operations?

© 2022 Foley & Lardner LLPNational Law Review, Volume XII, Number 126
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement
Advertisement

About this Author

Peter Vogel, trial attorney, Foley Lardner
Partner

Peter Vogel is renowned as both a trial and transactional lawyer who deeply understands technology, science and intellectual property, and the opportunities and problems they pose for clients. Governments and administrative agencies, as well as major corporations and emerging businesses, rely on Peter to get right to the heart of an information technology or e-discovery dispute; he knows what to expect and how it will play out in the courtroom. This eliminates unproductive rabbit trails and reduces the cost of litigation for all parties. When negotiating agreements for...

214-999-4422
Advertisement
Advertisement
Advertisement