Zero Trust Working Group Charter 2022 - Final V1
CISO Perspectives and Progress in Deploying Zero Trust
+ Released: June 3, 2022
Integrating SDP and DNS: Enhanced Zero Trust Policy Enforcement
+ Released: April 12, 2022
Software-Defined Perimeter (SDP) Specification v2.0
+ Released: May 10, 2022
+ Released: May 27, 2020
Software-Defined Perimeter as a DDoS Prevention Mechanism
+ Released: October 27, 2019
(SDP): Awareness and Adoption Infographic
+ Released: July 1, 2019
SDP Architecture Guide v2
+ Released: May 7, 2019
Software Defined Perimeter Glossary
+ Released: June 12, 2018
• ZT Inquiries - [email protected]• Erik Johnson - [email protected]
• John Yeoh - [email protected]
Research Working Group Co-chairs
• Jerry Chapman• Jason Garbis
• Chris Steffen
StructureThe CSA Zero Trust Working Group has the following nine work streams: 1. Zero Trust as a Philosophy & Guiding Principles 2. Zero Trust Organizational Strategy & Governance 3. Pillar: Identity 4. Pillar: Device 5. Pillar: Network/Environment 6. Pillar: Applications & Workload 7. Pillar: Data 8. Automation, orchestration, visibility & analytics 9. Zero Trust Architecture, Implementation & Maturity ModelExpressions of interest in working group and specific workstream participation can be registered here or by sending an email to [email protected].
https://cloudsecurityalliance.zoom.us/rec/share/3Pak1nHIU0_SV6sUxmY7JzWBACbmNUs15KWrrLqisHw9duigYsULf8exs_6A0q9X.9dF6ha1bhkSFroF2 Passcode: ZTimplement101! Our senior subject matter expert advisor and the founder of Zero Trust has graciously offered ...
The spreadsheet link is working for me now, thanks @Erik Johnson I encourage everone with ZTA experience to comment, both privately and as part of CSA. So important that practical experience and lessons learned off the horse's back are passed on. ...
Revisiting this ZT/blockchain thread as the risk to ZT posed by human error, insider threats, shadow IT, device sprawl, and software supply chain vulnerabilities grow exponentially. For example, one of the solutions we're designing at NetraScale involves ...
Hi All, NIST announces the release of Special Publication (SP) 800-207A, A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments. Enterprise application environments consist of geographically distributed ...
Erik, having commented as the Software Defined Perimeter Working Group on NIST publications for years, I can assure you that as a group, we self organised, and managed to provide in depth commentary to many 800 Special Publications, and our collaboration ...
CSA Zero Trust Research - Full Working Group Monthly Meeting Recording and Deck
CSA ZT Working Group informational presentation: Introduction to open source Zero Trust Networking & ...
FinCloud Friday with John Kindervag - presentation and demo recording available - ON2IT ZT Implementation Methodology Presentation for Financial Institutions
CISA recently released version 2 of their Zero Trust Maturity Model. There is a lot of interest across the public and private sectors to understand the differences and motivations behind V2. To assess the new version of the document, CSA is hosting a webinar panel of CISA and industry experts at 1PM ET on 5/31 to provide a summary and analysis of the changes and a discussion about the potential implications for both public and private sector implementers of Zero Trust.
The Cybersecurity and Infrastructure Security Agency has published the second version of its Zero Trust Maturity Model: https://www.cisa.gov/sites/default/files/2023-04/zero_trust_maturity_model_v2_508.pdf
--------------------------“So just to get everyone prepared in the next week or so we should have the second version of the Maturity Model. It’s not on the website yet today as we’d expected, but it should be next week,” said CISA Senior Cybersecurity Architect Sean Connelly. Connelly was speaking at during the 2023 ATARC Zero Trust Summit in Washington on Thursday.
The latest version of the guidance is expected to update key definitions and metrics for the governmentwide adoption of zero-trust security architectures.https://fedscoop.com/cisa-zero-trust-maturity-model-2-0-expected-in-coming-days/