View Resource
Advancing Zero Trust Maturity Throughout the Application and Workload Pillar
Release Date: 05/24/2024
Organization: NSA
Content Type: Guidance
Solution Provider Neutrality: Neutral
Adopting a ZT framework bolsters the protection of critical applications and workloads with a decisive shift from a network-centric to a data-centric security model (DSM) and granular implementation of attribute-based access control (ABAC) for every data access. A modernized ZT framework integrates visibility from multiple vantage points, makes risk-aware access decisions, and automates detection and response. The application and workload pillar disrupts the efforts of malicious actors by bringing granular access control and visibility to applications and workloads in the environment.