Cloud 101CircleEventsBlog
Join us for Cybersecurity Awareness Month! Strengthen your cyber resilience with essential security tips and resources for everyone.

Download Publication

Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1

Zero Trust Guiding Principles v1.1

Release Date: 09/03/2024

Working Group: Zero Trust

Zero Trust is a strategic mindset that is highly useful for organizations to adopt as part of their digital transformations. Based on the idea of "never trust, always verify," the Zero Trust model helps strengthen security and resilience. However, people also tend to misunderstand and over-complicate Zero Trust. Conflicting messaging and a lack of established standards bars many organizations from proceeding with Zero Trust adoption.

This document provides a clear understanding of what Zero Trust security is and lays out the guiding principles for planning, implementing, and operating Zero Trust. These Zero Trust best practices remain consistent across all Zero Trust pillars, use cases, environments, and products.

The updates for Version 1.1 include graphics to promote readability and references to AI.

Principles Covered:
  • Begin with the end in mind
  • Do not overcomplicate
  • Products are not the priority
  • Access is a deliberate act
  • Inside out, not outside in 
  • Breaches happen
  • Understand your risk appetite
  • Ensure the tone from the top
  • Instill a Zero Trust culture
  • Start small and focus on quick wins
  • Continuously monitor
Download this Resource

Bookmark
Share
Related resources
Strengthening Research Integrity with High-Performance Computing (HPC) Security
Strengthening Research Integrity with High-Perf...
Top Threats to Cloud Computing 2024
Top Threats to Cloud Computing 2024
Quantum-Safe Security Governance with the Cloud Controls Matrix
Quantum-Safe Security Governance with the Cloud...
Secure by Design: Implementing Zero Trust Principles in Cloud-Native Architectures
Secure by Design: Implementing Zero Trust Principles in Cloud-Nativ...
Published: 10/03/2024
What ‘Passwordless’ Really Means for Privileged Access Management
What ‘Passwordless’ Really Means for Privileged Access Management
Published: 10/03/2024
Aligning Security Testing with IT Infrastructure Changes
Aligning Security Testing with IT Infrastructure Changes
Published: 10/03/2024
Elevating Application Security Beyond “AppSec in a Box”
Elevating Application Security Beyond “AppSec in a Box”
Published: 10/02/2024
Defending Against the Cloud Adversary: Detection and Response in the Cloud
Defending Against the Cloud Adversary: Detection and Response in th...
October 24 | Online
Achieve Zero Trust Identity with the new 7 A’s of IAM
Achieve Zero Trust Identity with the new 7 A’s of IAM
November 7 | Online
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training