What security teams need to know about the NSA's new zero trust guidelines
The new guidelines aim to move an organization from discovery to target-level implementation of zero trust practices
The US National Security Agency (NSA) has released Phase One and Phase Two of its Zero Trust Implementation Guidelines.
The guidelines cover what's needed to achieve the Department of War's (DoW) targets for zero trust maturity.
Phase One and Phase Two aim to move an organization from discovery to target-level implementation by mapping out the activities, requirements, precursors and successors that are needed.
According to the NSA, the phased design of the guidelines means they're modular and highly customizable, allowing the implementation of both foundational and advanced activities, as well as the ability to tailor them to align with individual goals and constraints.
They build on the NSA's Primer and Discovery Phases, released earlier this month, and are aligned with existing federal frameworks, including the DoW CIO’s Zero Trust Framework.
What the zero trust guidelines get right
Brian Soby, CTO and co-founder of AppOmni, said there's a lot that the guidelines get right, adding that the move represents a positive step in helping organizations shore up identity security.
"The guidance pushes maturity beyond 'authenticate, then trust', toward ongoing decisions driven by what the user is doing, what privileges are being requested, and what resources are being touched," he said.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"That matters because the attacks that are winning right now are post-auth. Device posture and login checks are necessary, but against modern SaaS compromise they can be largely performative if you cannot detect abuse happening inside the session, inside the application."
Soby also praised the way that zero trust is presented as an operating model, not a product.
Policies are required to be centrally defined, consistently applied, continuously assessed, and enforced through co-ordinated policy decision points and policy enforcement points.
This includes requirements for real-time monitoring and automation to adapt as conditions change.
When it comes to User and Entity Behavior Analytics (UEBA), Soby noted the guidance takes the right approach, focusing on behavior baselining, analytics, and context enrichment so that anomalies are detected based on behavioral patterns and resource access, not just simplistic indicators like login location.
"That's the right direction. ‘We saw a new IP’ is a weak signal,” he commented. “The higher-signal story is what happened in the application: Privilege use, data access, configuration changes, creation of integrations, unusual exports, and lateral movement across SaaS capabilities.
"The higher-signal story is what happened in the application: Privilege use, data access, configuration changes, creation of integrations, unusual exports, and lateral movement across SaaS capabilities."
Why some zero trust efforts fall flat
Soby warned that most zero trust implementation projects are missing the core points. A key factor here is that they focus too heavily on zero trust network access (ZTNA) considerations, and ZTNA-only architectures are often easier to bypass.
Meanwhile, organizations fail to recognize that each application is its own policy decision point and policy enforcement point.
“This is the core point that gets ignored. The guidance treats policy decision points and policy enforcement points as essential building blocks that must be coordinated. The problem is that many organizations pretend the only real decision and enforcement happens at the identity provider or a proxy," he said.
"In reality, every application, SaaS or otherwise, is itself a policy decision point and policy enforcement point. The application decides what a user, integration, service account, or agent can do, and it enforces that decision.”
Soby noted this is “especially true” in cases where identities don’t “traverse the enterprise front door” - for example, with customers, partners, and external collaborators.
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Amazon's OpenAI investment points to troubled waters for the hyperscalerNews The hyperscaler is among a number of firms targeting investment in the company
-
ControlUp snaps up Unipath to broaden AI capabilitiesNews The digital employee experience (DEX) provider is implementing a new agentic AI framework to eliminate IT involvement in building remediations
-
Fears over “AI model collapse” are fueling a shift to zero trust data governance strategiesNews Gartner warns of "model collapse" as AI-generated data proliferates – and says organizations need to beware
-
Microsoft opens up Entra Agent ID preview with new AI featuresNews Microsoft Entra Agent ID aims to help manage influx of AI agents using existing tools
-
Research shows the financial benefits of implementing zero trustNews With zero trust shown to drastically reduce the number of cyber incidents, insurers are catching on and lowering premiums
-
Microsoft ramps up zero trust capabilities amid agentic AI pushNews The move from Microsoft looks to bolster agent security and prevent misuse
-
Zero trust gains momentum amid growing network visibility challengesNews Organizations are looking to automation, orchestration, and risk mitigation as key security priorities
-
Billions of IoT devices will need to be secured in the next four years – zero trust could be the key to successNews Researchers have warned more than 28 billion IoT devices will need to be secured by 2028 as attacks on connected devices surge.
-
Cognizant and Zscaler expand partnership to launch new AI-powered zero trust security toolsNews The pair’s expanded partnership aims to help customers simplify their security setups while tackling evolving cyber threats
-
The evolution of SASE and its importance in zero trustSupported Content SASE has been an increasingly important security framework for five years – but integrating zero trust is crucial to its success
