gptkbp:instanceOf
|
gptkb:NIST_Special_Publication
|
gptkbp:author
|
gptkb:Oliver_Borchert
gptkb:Sean_Connelly
gptkb:Stu_Mitchell
gptkb:Scott_Rose
|
gptkbp:category
|
Federal cybersecurity guidance
|
gptkbp:citation
|
gptkb:Executive_Order_14028
|
gptkbp:documentType
|
800-207
|
gptkbp:focusesOn
|
Zero Trust security model
|
https://www.w3.org/2000/01/rdf-schema#label
|
SP 800-207
|
gptkbp:language
|
English
|
gptkbp:publicationDate
|
2020-08
|
gptkbp:publishedBy
|
gptkb:National_Institute_of_Standards_and_Technology
|
gptkbp:recommendation
|
Micro-segmentation
Continuous verification of user and device identities
Assume breach principle
Least privilege access
|
gptkbp:series
|
gptkb:NIST_Special_Publication_800-series
|
gptkbp:status
|
Final
|
gptkbp:subject
|
Cybersecurity
Network security
Access control
|
gptkbp:title
|
gptkb:Zero_Trust_Architecture
|
gptkbp:url
|
https://csrc.nist.gov/publications/detail/sp/800-207/final
|
gptkbp:usedBy
|
gptkb:US_Federal_Government
Private sector organizations
|
gptkbp:bfsParent
|
gptkb:NIST
|
gptkbp:bfsLayer
|
5
|