Cloud 101CircleEventsBlog

View Resource

Defining the Zero Trust Protect Surface
Defining the Zero Trust Protect Surface

Defining the Zero Trust Protect Surface

Release Date: 03/07/2024
Organization: CSA
Content Type: Guidance
Solution Provider Neutrality: Neutral
Enterprise adoption of Zero Trust is broad and growing. How is a mature Zero Trust program achieved? The NSTAC Report to the President on Zero Trust and Trusted Identity Management outlines a five-step implementation process. 

This publication by the CSA Zero Trust Working Group provides guidance on iteratively executing the first step of the Zero Trust implementation process, “Defining the Protect Surface.” Defining the protect surface entails identifying, categorizing, and assessing an organization's data, applications, assets, and services (DAAS); business risk; and current security maturity. In this document, readers will find valuable guidance that starts their Zero Trust security journey on the right path.

View this Resource

Interested in helping develop research with CSA?