{"id":25035,"date":"2024-08-07T13:00:54","date_gmt":"2024-08-07T21:00:54","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/08\/07\/news-18765\/"},"modified":"2024-08-07T13:00:54","modified_gmt":"2024-08-07T21:00:54","slug":"news-18765","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/08\/07\/news-18765\/","title":{"rendered":"How Microsoft and NIST are collaborating to advance the Zero Trust Implementation"},"content":{"rendered":"<p><strong>Credit to Author: Mark Simos| Date: Tue, 06 Aug 2024 20:00:00 +0000<\/strong><\/p>\n<p>We are announcing the release of the recently published Zero Trust practice guide in collaboration between Microsoft and the National Cybersecurity Center of Excellence (NCCoE). This <a href=\"https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2024-07\/zta-nist-sp-1800-35-preliminary-draft-4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">guide<\/a> details how to implement a&nbsp;Zero Trust strategy, and what an end to end security approach using Zero Trust means for you and your organization.&nbsp;<\/p>\n<p>While the <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust?msockid=32ef0b8a8abe635b098c1fae8b216268\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust?msockid=32ef0b8a8abe635b098c1fae8b216268\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust security model<\/a> is continuing to gain momentum, customers regularly ask for guidance on how to deploy this model effectively using today\u2019s available technology. Microsoft participating in an <a href=\"https:\/\/www.nccoe.nist.gov\/projects\/implementing-zero-trust-architecture\" target=\"_blank\" rel=\"noreferrer noopener\">ongoing collaboration<\/a> led by the National Institute of Standards and Technology\u2019s (NIST\u2019s) NCCoE. Microsoft joined this effort to support this important mission and to help answer our customer&#8217;s need for references on Zero Trust implementations.\u00a0\u00a0\u00a0<\/p>\n<p>Since 2022, the NCCoE has collaborated with 24 vendors, including Microsoft, on developing a <a href=\"https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2024-07\/zta-nist-sp-1800-35-preliminary-draft-4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"https:\/\/www.nccoe.nist.gov\/sites\/default\/files\/2024-07\/zta-nist-sp-1800-35-preliminary-draft-4.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">practice guide<\/a> with practical steps for organizations eager to implement cybersecurity reference designs for Zero Trust. Zero Trust principles include assuming compromise (assuming breach) to drive a holistic and practical security approach, verifying trust explicitly before granting access to assets, and limiting the blast radius by granting the least privilege necessary. The Zero Trust model describes a collaborative comprehensive approach for end-to-end security that is required to keep up with continuous changes in threats, technology, and business.<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;The NCCoE strives to launch initiatives that directly benefit organizations facing modern cybersecurity challenges. The lessons learned from integrating various products and services contributed by collaborators like Microsoft is an invaluable contribution toward this effort.&#8221;<\/p>\n<p> <cite>\u2014Alper Kerman of NIST<\/cite><\/p><\/blockquote>\n<p>Security isn\u2019t easy\u2014it\u2019s always been an extremely complex and challenging discipline and Zero Trust is now transforming how many aspects of that discipline are done. While there is much more to do, we are encouraged by seeing customers make rapid progress on Zero Trust and getting meaningful benefits from it.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"col-md-4\"> \t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/06\/340656_SCI_Zero_Trust_3Drender_Overhead_8500x8500_01.jpg\" class=\"card-img img-object-cover\" alt=\"Decorative image of three interlocking circles.\" \/>\t\t\t\t<\/div>\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>NIST: Implementing a Zero Trust Architecture<\/h2>\n<div class=\"mb-3\">\n<p>This guide from NIST shares practical guidance to implement Zero Trust from the NCCoE labs.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.nccoe.nist.gov\/projects\/implementing-zero-trust-architecture\" class=\"btn btn-link text-decoration-none p-0\" target=\"_blank\"> \t\t\t\t\t\t\t\t<span>Read the guide<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"microsoft-and-the-nist-nccoe-united-in-prioritizing-zero-trust-model\">Microsoft and the NIST NCCoE: United in prioritizing Zero Trust model<\/h2>\n<p>Both Microsoft and the NCCoE have been strong advocates of the Zero Trust model for years. This diagram illustrates how Microsoft technology maps to the NIST Zero Trust model:<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1-1024x576.jpg\" alt=\"A diagram displaying Microsoft's Zero Trust capability mapping to the NIST Zero Trust Architecture.\" class=\"wp-image-135362\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1-1024x576.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1-300x169.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1-768x432.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1-615x346.jpg 615w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1-336x189.jpg 336w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1-189x106.jpg 189w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1-630x354.jpg 630w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/08\/Picture1.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p>NIST\u2019s role in cybersecurity cannot be overstated. In addition to publishing security standards for decades, NIST\u2019s collaborative hub, called the NCCoE, has brought clarity on how to&nbsp;design and implement Zero Trust by publishing how-to guides, practice guides, and business case examples.&nbsp;&nbsp;<\/p>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>&#8220;The NCCoE is dedicated to helping organizations strengthen their cybersecurity. A major way we do this is by translating existing security standards into example implementation guidance, so organizations know exactly what they need to do to protect their most critical assets. By simplifying the process, we can get more organizations benefiting from Zero Trust principles.&#8221;<\/p>\n<p> <cite>\u2014Alper Kerman of NIST<\/cite><\/p><\/blockquote>\n<h2 class=\"wp-block-heading\" id=\"the-microsoft-and-nist-nccoe-collaboration\">The Microsoft and NIST NCCoE collaboration<\/h2>\n<p>Microsoft has participated for decades in NIST\u2019s open and transparent process for standards development and in particular supported NIST NCCoE \u2018s mission to develop practical, interoperable cybersecurity approaches that show how the components of zero trust architectures can securely mitigate risks and meet industry sectors\u2019 compliance requirements. Microsoft has been impressed by NIST\u2019s role serving as a credible and clear voice in the security industry. When we found out about this latest collaboration opportunity, we knew we wanted to play a part.&nbsp;<\/p>\n<p>In October 2020, when the NCCoE sought industry partners to support the implementation of the Zero Trust architecture project, we jumped at the opportunity. The <a href=\"https:\/\/www.nccoe.nist.gov\/projects\/implementing-zero-trust-architecture\" target=\"_blank\" rel=\"noreferrer noopener\">NCCoE\u2019s Zero Trust architecture project<\/a> is its largest to date with 24 participating organizations, seventeen different builds, and a rich set of practical documentation. The goal of this NCCoE project is to demonstrate several example zero trust architecture solutions\u2014applied to a conventional, general-purpose enterprise IT infrastructure\u2014that are designed and deployed according to the concepts and tenets documented in <a href=\"https:\/\/csrc.nist.gov\/pubs\/sp\/800\/207\/final\" target=\"_blank\" rel=\"noreferrer noopener\">NIST Special Publication (SP) 800-207<\/a>, Zero Trust Architecture. The documents from this work effectively demonstrate how to practically implement Zero Trust principles using today\u2019s technology.&nbsp;&nbsp;<\/p>\n<p>The project addresses several common scenarios you may face:&nbsp;<\/p>\n<ul>\n<li>An employee seeks access to corporate resources to complete their work.<\/li>\n<li>An employee seeks access to internet resources from enterprise devices to complete tasks.&nbsp;<\/li>\n<li>A contractor tries to access corporate resources and internet resources.&nbsp;<\/li>\n<li>Servers within an enterprise are communicating with each other.&nbsp;<\/li>\n<li>An organization is collaborating with a business partner and wants to securely access specific resources.&nbsp;<\/li>\n<li>An organization wants to integrate monitoring and security information and event management (SIEM) systems with the policy engine for more precise trust scores.<\/li>\n<\/ul>\n<p>As part of this effort, the NCCoE just announced the general availability of the <a href=\"https:\/\/www.nccoe.nist.gov\/projects\/implementing-zero-trust-architecture\" target=\"_blank\" rel=\"noreferrer noopener\">Zero Trust Architecture 1800-35 practice guide<\/a> in conjunction with the Zero Trust architecture project. The practice guide details a standards-based implementation of Zero Trust architecture. The guide offers a learning pathway to greater understanding of the Zero Trust security model, and includes practical use cases and various example implementations and associated documentation. It was developed to be simple, usable, and practical. <\/p>\n<h2 class=\"wp-block-heading\" id=\"collaboration-brings-learning-and-value\">Collaboration brings learning and value <\/h2>\n<p>These resources help Microsoft customers support end-to-end integrations that lead to significant value over time. Our Zero Trust implementation with the NCCoE has already helped us evolve Microsoft technology and guidance for a successful Zero Trust product deployment and will continue to do so.&nbsp;<\/p>\n<h2 class=\"wp-block-heading\" id=\"what-the-future-of-zero-trust-will-bring\">What the future of Zero Trust will bring<\/h2>\n<p>Both Microsoft and NIST are investigating opportunities to leverage this foundational work to support other use case scenarios that will benefit from ZT deployment model. Microsoft is excited by the government\u2019s deep commitment to Zero Trust architecture and have been closely monitoring US Executive Order 14028 on Cybersecurity and the OMB Implementation Strategy. <\/p>\n<p>Microsoft is continuously working to achieve an&nbsp;integrated set of offerings to enable customers to more easily and comprehensively address the security challenges they face. Microsoft is also continuously integrating lessons learned from cyberattacks on ourselves as well as on our customer into our guidance and technology. The growth of AI and its close relationship to Zero Trust make this transformation an even more critical effort\u2014a network perimeter can\u2019t secure your AI or your data.<\/p>\n<h2 class=\"wp-block-heading\" id=\"explore-strategies-for-implementing-zero-trust\">Explore strategies for implementing Zero Trust<\/h2>\n<p>We know that adopting a Zero Trust approach is challenging as it requires a shift in mindset, strategy, and architecture as well as a lot of engineering work. We are encouraged by the positive progress and feedback from our customers on this journey, from <a href=\"https:\/\/www.microsoft.com\/security\/business\/reports-analysis\/industry-recognized-cybersecurity-leader\" target=\"_blank\" rel=\"noreferrer noopener\">industry analysts<\/a>, and other sources. Microsoft is working to ease these challenges through NIST\u2019s NCCoE Zero Trust Architecture consortium, with our <a href=\"https:\/\/aka.ms\/SAF\" target=\"_blank\" rel=\"noreferrer noopener\">Security Adoption Framework (SAF)<\/a>,and other security guidance.\u00a0<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p>Learn more about&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a>.<\/p>\n<p>You can follow Mark Simos on LinkedIn and explore <a href=\"https:\/\/aka.ms\/MarksList\" target=\"_blank\" rel=\"noreferrer noopener\">Mark\u2019s List<\/a> of commonly shared cybersecurity resources. <\/p>\n<p>To learn more about Microsoft Security solutions, visit our&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><strong>About the National Cybersecurity Center of Excellence<\/strong><\/p>\n<p>The NCCoE, a part of NIST, is a collaborative hub where industry organizations, government agencies, and academic institutions work together to address businesses\u2019 most pressing cybersecurity issues. This public-private partnership enables the creation of practical cybersecurity solutions for specific industries, as well as for broad, cross-sector technology challenges. Through consortia under CRADAs, including technology partners\u2014from Fortune 50 market leaders to smaller companies specializing in information technology and operational technology security\u2014the NCCoE applies standards and best practices to develop modular, easily adaptable example cybersecurity solutions by using commercially available technology. The NCCoE documents these example solutions in the NIST Special Publication 1800 series, which maps capabilities to the NIST Cybersecurity Framework and details the steps needed for another entity to re-create the example solution. The NCCoE was established in 2012 by NIST in partnership with the State of Maryland and Montgomery County, Maryland. Information is available at <a href=\"https:\/\/www.nccoe.nist.gov\">https:\/\/www.nccoe.nist.gov<\/a>.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/08\/06\/how-microsoft-and-nist-are-collaborating-to-advance-the-zero-trust-implementation\/\">How Microsoft and NIST are collaborating to advance the Zero Trust Implementation<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/08\/06\/how-microsoft-and-nist-are-collaborating-to-advance-the-zero-trust-implementation\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Mark Simos| Date: Tue, 06 Aug 2024 20:00:00 +0000<\/strong><\/p>\n<p>Both Microsoft and the National Institute of Standards and Technology (NIST) National Cyber security Center of Excellence (NCCoE) have translated the Zero Trust Architecture (ZTA) and Security Model into practical and actionable deployment. In this blog post, we explore details of their collaboration on a Zero Trust (ZT) implementation and what this learning pathway means for your organization.\u200b\u200b<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/08\/06\/how-microsoft-and-nist-are-collaborating-to-advance-the-zero-trust-implementation\/\">How Microsoft and NIST are collaborating to advance the Zero Trust Implementation<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-25035","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25035","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25035"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25035\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25035"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25035"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25035"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}