Cloud 101CircleEventsBlog
Submit a Peer Review for the AI Controls Matrix—a groundbreaking framework to address AI risks and strengthen security.

View Resource

Advancing Zero Trust Maturity Throughout the Application and Workload Pillar
Advancing Zero Trust Maturity Throughout the Application and Workload Pillar

Advancing Zero Trust Maturity Throughout the Application and Workload Pillar

Release Date: 05/24/2024
Organization: NSA
Content Type: Guidance
Solution Provider Neutrality: Neutral
Adopting a ZT framework bolsters the protection of critical applications and workloads with a decisive shift from a network-centric to a data-centric security model (DSM) and granular implementation of attribute-based access control (ABAC) for every data access. A modernized ZT framework integrates visibility from multiple vantage points, makes risk-aware access decisions, and automates detection and response. The application and workload pillar disrupts the efforts of malicious actors by bringing granular access control and visibility to applications and workloads in the environment.  

View this Resource

Interested in helping develop research with CSA?