NIST Zero Trust Architecture Implementations Guide

The National Institute of Standards and Technology (NIST) has published a new resource to aid organizations in implementing zero trust architectures (ZTAs), a cybersecurity approach that assumes no user or device is inherently trustworthy.

The guidance, titled Implementing a Zero Trust Architecture (NIST SP 1800-35), details 19 example ZTA implementations using commercially available technologies, offering organizations practical blueprints for securing modern, distributed networks.

Developed through a four-year collaboration at NIST’s National Cybersecurity Center of Excellence (NCCoE) with 24 industry partners, including major technology firms, the publication addresses the complexities of transitioning from traditional perimeter-based security to zero trust.

Unlike legacy models that rely on a single firewall to protect assets within a defined network boundary, ZTA continuously evaluates and verifies access requests, regardless of the user’s location or prior authentication.

This approach is critical for securing hybrid environments with remote workers, cloud-based applications, and distributed data centers.

“Switching to zero trust requires understanding who’s accessing what resources and why,” said Alper Kerman, a NIST computer scientist and co-author of the publication. “Every organization’s network is unique, making ZTA a custom build. This guidance provides a foundational starting point for organizations to construct their own ZTAs.”

google

The publication builds on NIST’s 2020 document, Zero Trust Architecture (NIST SP 800-207), which outlined ZTA concepts and deployment models.

The new guidance goes further, offering detailed implementation examples, test results, and best practices derived from real-world scenarios.

These scenarios simulate complex enterprise environments, including multi-cloud platforms, branch offices, and public WiFi access points like coffee shops used by remote employees.

The 19 example architectures leverage off-the-shelf commercial technologies, though NIST and NCCoE emphasize that their inclusion does not constitute an endorsement.

The guidance maps these solutions to cybersecurity frameworks, including the NIST Cybersecurity Framework and NIST SP 800-53, providing organizations with actionable insights for aligning ZTA deployments with industry standards.

Key features of the publication include:

  • Practical Implementations: 19 ZTA configurations, each tested and documented with setup details, configurations, and troubleshooting insights.
  • Real-World Scenarios: Use cases reflecting modern network challenges, such as securing remote access and multi-cloud environments.
  • Collaborative Effort: Contributions from 24 industry collaborators, ensuring a broad perspective on ZTA deployment.
  • Best Practices: Lessons learned from four years of testing, offering guidance on technology selection and integration.

Here’s a clean, structured table based on your provided content — showing various Policy Engines / Policy Decision Points and their associated Zero Trust Architecture (ZTA) builds, along with architecture and implementation instruction links or placeholders.

BuildPolicy Engine / PDPZTA Architecture InstantiatedArchitecture DetailsImplementation Instructions
E1B1Okta Identity Cloud, Ivanti Access ZSOEIG CrawlE1B1 Build ArchitectureE1B1 Build Implementation Instructions
E2B1Ping Identity PingFederateEIG CrawlE2B1 Build ArchitectureE2B1 Build Implementation Instructions
E3B1Azure AD (Entra Conditional Access)EIG CrawlE3B1 Build ArchitectureE3B1 Build Implementation Instructions
E1B2Zscaler ZPA Central Authority (CA)EIG RunE1B2 Build ArchitectureE1B2 Build Implementation Instructions
E3B2Azure AD (Entra Conditional Access), Microsoft Intune, Forescout eyeControl, eyeExtendEIG RunE3B2 Build ArchitectureE3B2 Build Implementation Instructions
E4B3IBM Security VerifyEIG RunE4B3 Build ArchitectureE4B3 Build Implementation Instructions
E1B3Zscaler ZPA Central Authority (CA)SDPE1B3 Build ArchitectureE1B3 Build Implementation Instructions
E2B3PingFederate, Cisco ISE, Cisco Secure WorkloadMicrosegmentationE2B3 Build ArchitectureE2B3 Build Implementation Instructions
E3B3Azure AD (Entra), Intune, Microsoft Sentinel, Forescout eyeControl & eyeExtendSDP + MicrosegmentationE3B3 Build ArchitectureE3B3 Build Implementation Instructions
E1B4Appgate SDP ControllerSDPE1B4 Build ArchitectureE1B4 Build Implementation Instructions
E2B4Symantec Cloud SWG, ZTNA, CASBSDP + SASEE2B4 Build ArchitectureE2B4 Build Implementation Instructions
E3B4F5 BIG-IP, NGINX Plus, Forescout eyeControl & eyeExtendSDPE3B4 Build ArchitectureE3B4 Build Implementation Instructions
E4B4VMware Workspace ONE, UAG, NSX-TSDP + Microsegmentation + EIGE4B4 Build ArchitectureE4B4 Build Implementation Instructions
E1B5Palo Alto NGFW, Prisma AccessSASE + MicrosegmentationE1B5 Build ArchitectureE1B5 Build Implementation Instructions
E2B5Lookout SSE, Okta Identity CloudSDP + SASEE2B5 Build ArchitectureE2B5 Build Implementation Instructions
E3B5Microsoft Entra Conditional Access (formerly Azure AD Conditional Access), Microsoft Security Service EdgeSDP and SASEE3B5 Build ArchitectureE3B5 Build Implementation Instructions
E4B5AWS Verified Access, Amazon VPC LatticeSDP and MicrosegmentationE4B5 Build ArchitectureE4B5 Build Implementation Instructions
E1B6Ivanti Neurons for Zero Trust AccessSDP and MicrosegmentationE1B6 Build ArchitectureE1B6 Build Implementation Instructions
E2B6Google CEP – Access Context ManagerSASEE2B6 Build ArchitectureE2B6 Build Implementation Instructions

Let me know if you want this table exported to Excel, a PDF, or visualized as a clickable infographic or architecture map.

“This resource is a comprehensive toolkit for organizations navigating the shift to zero trust,” Kerman said. “It demonstrates the capabilities needed to deploy a ZTA effectively.”

The rise of distributed workforces and cloud services has rendered traditional perimeter-based security obsolete, as organizations now manage multiple internal networks and external resources.

ZTA’s risk-based approach mitigates both internal and external threats by restricting lateral movement within networks, making it a preferred strategy for many organizations, including those mandated to adopt it.

The full publication is available through NIST’s website, providing a critical resource for cybersecurity professionals seeking to bolster their defenses in an increasingly complex threat landscape.

Automate threat response with ANY.RUN’s TI Feeds—Enrich alerts and block malicious IPs across all endpoints -> Request full access

googlenews
Balaji N
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.