ChaptersEventsBlog
Register for the Visibility is Velocity webinar on Oct 28 to learn how leading IT teams turn insights into real-time action.

Download Publication

Toward a Zero Trust Architecture - Japanese Translation
Toward a Zero Trust Architecture - Japanese Translation

Toward a Zero Trust Architecture - Japanese Translation

Release Date: 02/10/2022

Working Group: Zero Trust

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

企業の利害関係者は、リアルタイムシステムの複雑化、新たなサイバーセキュリティポリ
シーの必要性、そしてセキュアにシステムを運用するために欠かせない力強い文化的サポート
といった課題を考慮する必要があります。ゼロトラストのような新たなテクノロジーソリューショ
ンやアプローチは、バイデン大統領の大統領令14028 Improving the Nation’s Cybersecurity
で定められた義務を果たすために不可欠です。本稿では、新たに登場した豊富で多様なソリューション
の意味と、ゼロトラストアーキテクチャ(ZTA)を最終的に実現するための組織の能力に対する課題につ
いて検討しています。また、企業のリーダーとセキュリティ担当者がそれぞれの環境にゼロトラストを
導入することを促進するために、業界が主要なステークホルダーグループ間のコラボレーションを強化
する方法についても提言しています。

Enterprise stakeholders must consider the challenges of increased real-time system complexity, the need for new cybersecurity policy and strong cultural support that is required to securely operate systems in a complex and hybrid world. Emerging technology solutions and approaches such as Zero Trust are critical to meeting the mandates in President Biden’s Executive Order on Improving the Nation’s Cybersecurity. The implications of an emerging, rich and diverse solutions landscape and the challenges to an organization’s ability to ultimately deliver a Zero Trust Architecture (ZTA) are explored in this paper. Recommendations on how industry can improve collaboration among key stakeholder groups is discussed to accelerate both enterprise leaders and security practitioners’ adoption of Zero Trust into their environments.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Why Identity Is the Cornerstone of Zero Trust Architecture
Why Identity Is the Cornerstone of Zero Trust Architecture
Published: 10/16/2025
5 Reasons Disconnected Apps Are An Enterprise Risk You Can No Longer Ignore
5 Reasons Disconnected Apps Are An Enterprise Risk You Can No Longe...
Published: 10/15/2025
When OAuth Tokens Go Rogue: Lessons from the Salesloft–Drift Breach
When OAuth Tokens Go Rogue: Lessons from the Salesloft–Drift Breach
Published: 10/08/2025
How Event-Based Identity Management Can Enable Dynamic Security
How Event-Based Identity Management Can Enable Dynamic Security
Published: 10/08/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training