{"id":156011,"date":"2022-03-07T06:00:48","date_gmt":"2022-03-07T14:00:48","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=156011"},"modified":"2022-03-07T09:32:21","modified_gmt":"2022-03-07T17:32:21","slug":"federal-guidelines-for-zero-trust","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2022\/03\/federal-guidelines-for-zero-trust\/","title":{"rendered":"Choosing Which Federal Guidelines to Follow for Zero Trust"},"content":{"rendered":"<p>Federal agencies are feeling increased pressure to adopt appropriate federal Zero Trust guidelines and accelerate their adoption of a Zero Trust architecture, following the recent release of a <a href=\"https:\/\/www.whitehouse.gov\/wp-content\/uploads\/2022\/01\/M-22-09.pdf\" rel=\"nofollow,noopener\" >U.S. Office of Management and Budget (OMB) memo<\/a>. The OMB memo is a continuation of the May 2021<a href=\"https:\/\/www.whitehouse.gov\/briefing-room\/presidential-actions\/2021\/05\/12\/executive-order-on-improving-the-nations-cybersecurity\/\" rel=\"nofollow,noopener\" > Executive Order on Improving the Nation\u2019s Cybersecurity<\/a>, which outlines aggressive implementation deadlines for a federal Zero Trust architecture strategy over the next two-and-a-half years.<\/p>\n<p>What\u2019s outlined in the OMB memo is a big ask on an intense timeline. <a href=\"https:\/\/www.zdnet.com\/article\/ombs-zero-trust-strategy-government-gets-good\/\" rel=\"nofollow,noopener\" >As one Forrester analyst noted<\/a>, if the government Zero Trust strategy is \u201cexecuted as mandated, not only will government agencies meet the security maturity levels of large organizations in the private sector\u2026 they\u2019ll also surpass them.\u201d<\/p>\n<p>While the transition to a Zero Trust cybersecurity approach offers a great deal of upside for federal agencies, many organizations are still trying to <a href=\"https:\/\/www.linkedin.com\/pulse\/guide-zero-trust-3-steps-palo-alto-networks-publicsector\/\" rel=\"nofollow,noopener\" >find direction in their journey<\/a>. One question we\u2019re hearing often from the agencies we work with is, \u201cWhich federal guidelines for Zero Trust should we follow?\u201d The good news is that each of the guidelines explored below can provide you with valuable information on guidance, functionality, security controls and operations for Zero Trust.<\/p>\n<p>Zero Trust is a strategic approach to cybersecurity that secures an organization by simplifying security to a single use case: the elimination of implicit trust and the continuous validation of every stage of a digital interaction. Choosing Zero Trust guidelines or frameworks and accessing expertise from trusted resources are critical steps to implementing an effective strategy. To help agencies with their decision-making, here\u2019s a quick overview of three of the most commonly cited Zero Trust frameworks.<\/p>\n<h2><a id=\"post-156011-_xajjvuclba8l\"><\/a>NIST Special Publication 800-207: Zero Trust Architecture<\/h2>\n<p><span style=\"font-weight: 400;\">The primary focus of<\/span><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/SpecialPublications\/NIST.SP.800-207.pdf\" rel=\"nofollow,noopener\" > <span style=\"font-weight: 400;\">the National Institute of Standards and Technology (NIST) guidelines<\/span><\/a><span style=\"font-weight: 400;\">, which were introduced in August 2020, is to help federal agencies reduce implicit trust zones and understand policy enforcement points and policy decision points. The guidelines cover the basics of Zero Trust and are meant to help federal agencies understand (at a macro level) how data, applications, systems and networks interact.\u00a0<\/span><\/p>\n<p>NIST recommends agencies design and deploy a Zero Trust architecture with adherence to seven basic tenets, from considering all data sources and computing services as resources, to collecting as much information as possible about the current state of assets, network infrastructure and communications and using that information to improve the organization\u2019s security posture.<\/p>\n<h2><a id=\"post-156011-_rozs17v96qpw\"><\/a>DOD Zero Trust Reference Architecture<\/h2>\n<p><span style=\"font-weight: 400;\">Released in February 2021, the<\/span> <a href=\"https:\/\/dodcio.defense.gov\/Portals\/0\/Documents\/Library\/(U)ZT_RA_v1.1(U)_Mar21.pdf\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Department of Defense (DOD) guidelines<\/span><\/a><span style=\"font-weight: 400;\"> offer a more operational and micro-level approach to Zero Trust than the guidance from NIST. The DOD Zero Trust Reference Architecture includes seven \u201cZero Trust Pillars and Capabilities\u201d and addresses specific functions and security controls, such as data loss prevention (DLP), data tagging and microsegmentation (practice of creating logical network zones to isolate network segments). This reference architecture includes a maturity model that describes the importance of establishing a baseline protection level prior to designing a Zero Trust architecture.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Per the directive, DOD agencies, including military departments and the Defense Information Systems Agency (DISA), should align to the DOD Zero Trust Reference Architecture as it was crafted with a defense-specific mission and requirements in mind. We also anticipate that many DOD agencies may decide to adopt some type of maturity model as well as measure their progress along their Zero Trust security evolution.<\/span><\/p>\n<h2><a id=\"post-156011-_lsoy25xt095y\"><\/a>CISA Zero Trust Maturity Model<\/h2>\n<p><span style=\"font-weight: 400;\">Finally, there is the <\/span><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/CISA%20Zero%20Trust%20Maturity%20Model_Draft.pdf\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Cybersecurity and Infrastructure Security Agency (CISA) Zero Trust Maturity Model<\/span><\/a><span style=\"font-weight: 400;\">, which was introduced in June 2021 as a resource primarily for civilian agencies. The CISA Zero Trust Maturity Model includes five pillars (identify, device, network\/environment, application workload and data) and three cross-cutting foundational elements: visibility and analytics, automation and orchestration and governance. This model outlines a good-better-best approach to Zero Trust, which CISA refers to as \u201ctraditional, advanced and optimal.\u201d<\/span><\/p>\n<p>The \u201coptimal\u201d stage of Zero Trust security is the ultimate goal, of course. At this point in the Zero Trust journey, according to CISA, a federal agency would be accomplishing many things:<\/p>\n<ul>\n<li>Continuously validating identity, not just when access is initially granted.<\/li>\n<li>Analyzing user behavior in real time with machine learning algorithms to determine risk and deliver ongoing protection.<\/li>\n<li>Fully automating technical enforcement of policies and updating policies to reflect new orchestration options.<\/li>\n<\/ul>\n<p>The above information offers only a brief glimpse at what the NIST, DOD and CISA guidelines for Zero Trust offer to federal agencies and provides a solid starting point for further exploration.<\/p>\n<h2><a id=\"post-156011-_ae4gxhvkj0vw\"><\/a>The Elimination of Implicit Trust<\/h2>\n<p>Federal agencies that are trying to decide which Zero Trust guidelines are most appropriate for their security needs should focus on the core premise of Zero Trust: never trust, always verify. It\u2019s the elimination of implicit trust and the validation of all digital interactions. Zero Trust offers a way for federal agencies to fortify their security for every aspect of their IT environment \u2013 users, applications and infrastructure \u2013 through constant validation. It isn\u2019t technology; it\u2019s a methodology.<\/p>\n<p>Regardless of which guidelines you follow, your agency will need the right combination of expertise and tools, including automation, orchestration and artificial intelligence\/machine learning, to support and continually improve on an effective Zero Trust architecture.<\/p>\n<h2><a id=\"post-156011-_8th0bhdh0vqu\"><\/a>Insight from a Zero Trust Thought Leader<\/h2>\n<p>Palo Alto Networks is a thought leader in Zero Trust. In 2021, NIST selected Palo Alto Networks as a private sector collaborator <span style=\"font-weight: 400;\">at the National Cybersecurity Center of Excellence<\/span><span style=\"font-weight: 400;\"> to help build<\/span> <a href=\"https:\/\/www.nccoe.nist.gov\/projects\/implementing-zero-trust-architecture\" rel=\"nofollow,noopener\" >Zero Trust Reference Architectures<\/a> using industry-leading technology capabilities. Through the National Security Telecommunications Advisory Committee (NSTAC), we also recently co-chaired a<a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Final%20Draft%20NSTAC%20Report%20to%20the%20President%20on%20Zero%20Trust%20and%20Trusted%20Identity%20Management.pdf\" rel=\"nofollow,noopener\" > study tasked by the White House<\/a> that provided industry guidance on how the government can most effectively implement the OMB Federal Zero Trust Strategy.<\/p>\n<p>As I mentioned earlier, each of these approaches can help you <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2022\/03\/the-federal-zero-trust-strategy\/\">address federal guidelines for Zero Trust<\/a> \u2013 all options are good options for getting started with your journey. We support all the federal guidelines for Zero Trust through our Professional Services organization. We can help federal agencies of all sizes accelerate their Zero Trust initiatives and meet the critical deadlines outlined by the White House, regardless of where they are in their Zero Trust journey. We take a comprehensive approach to the Zero Trust Enterprise across users, applications and infrastructure to deliver one of the most thorough toolsets in the industry.<\/p>\n<p>If you\u2019d like to learn more about how Palo Alto Networks can help your agency become a Zero Trust Enterprise and implement the federal guidelines most appropriate for your organization, reach out to our <a href=\"https:\/\/www.paloaltonetworks.com\/services\/consulting\">Professional Services team<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Federal agencies are feeling increased pressure to adopt appropriate federal guidelines for Zero Trust and accelerate their Zero Trust architecture.<\/p>\n","protected":false},"author":723,"featured_media":156012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6724,6769],"tags":[3100,183,3779,73],"coauthors":[8399],"class_list":["post-156011","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-points-of-view","category-public-sector","tag-federal","tag-nist","tag-sled","tag-zero-trust"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2022\/03\/Serious-Man-2.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/156011","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/723"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=156011"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/156011\/revisions"}],"predecessor-version":[{"id":156048,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/156011\/revisions\/156048"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/156012"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=156011"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=156011"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=156011"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=156011"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}