Cloud 101CircleEventsBlog
Don't miss out! Join us for the free, virtual Global AI Symposium from October 22nd - 24th—register today!

Download Publication

Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1

Zero Trust Guiding Principles v1.1

Release Date: 09/03/2024

Working Group: Zero Trust

Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never trust, always verify," the Zero Trust model helps strengthen security and resilience. However, people also tend to misunderstand and over-complicate Zero Trust. Conflicting messaging and a lack of established standards bars many organizations from proceeding with Zero Trust adoption.

This document provides a clear understanding of what Zero Trust security is and lays out the guiding principles for planning, implementing, and operating Zero Trust. These Zero Trust best practices remain consistent across all Zero Trust pillars, use cases, environments, and products.

The updates for Version 1.1 include graphics to promote readability and references to AI.

Principles Covered:
  • Begin with the end in mind
  • Do not overcomplicate
  • Products are not the priority
  • Access is a deliberate act
  • Inside out, not outside in 
  • Breaches happen
  • Understand your risk appetite
  • Ensure the tone from the top
  • Instill a Zero Trust culture
  • Start small and focus on quick wins
  • Continuously monitor
Download this Resource

Bookmark
Share
Related resources
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Quantum-Safe Security Governance with the Cloud Controls Matrix
Quantum-Safe Security Governance with the Cloud...
Optimizing Secrets Management to Enhance Security and Reduce Costs
Optimizing Secrets Management to Enhance Security and Reduce Costs
Published: 10/22/2024
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security Strategy Storm
Top Threat #4 - Cloudy with a Chance of Breach: The Cloud Security ...
Published: 10/21/2024
5 Behaviors for Transforming Your Cybersecurity Leadership
5 Behaviors for Transforming Your Cybersecurity Leadership
Published: 10/21/2024
Navigating Cloud Security: A Shared Responsibility
Navigating Cloud Security: A Shared Responsibility
Published: 10/17/2024
Defending Against the Cloud Adversary: Detection and Response in the Cloud
Defending Against the Cloud Adversary: Detection and Response in th...
October 24 | Online
Achieve Zero Trust Identity with the new 7 A’s of IAM
Achieve Zero Trust Identity with the new 7 A’s of IAM
November 7 | Online
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training