• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Microcontroller Tips

Microcontroller engineering resources, new microcontroller products and electronics engineering news

  • Products
    • 8-bit
    • 16-bit
    • 32-bit
    • 64-bit
  • Applications
    • 5G
    • Automotive
    • Connectivity
    • Consumer Electronics
    • EV Engineering
    • Industrial
    • IoT
    • Medical
    • Security
    • Telecommunications
    • Wearables
    • Wireless
  • Learn
    • eBooks / Tech Tips
    • EE Training Days
    • FAQs
    • Learning Center
    • Tech Toolboxes
    • Webinars/Digital Events
  • Resources
    • Design Guide Library
    • LEAP Awards
    • Podcasts
    • White Papers
  • Videos
    • EE Videos & Interviews
    • Teardown Videos
  • EE Forums
    • EDABoard.com
    • Electro-Tech-Online.com
  • Engineering Training Days
  • Advertise
  • Subscribe

How does a zero trust security architecture work?

December 18, 2024 By Jeff Shepard Leave a Comment

Zero trust architectures (ZTAs) are a reaction to the emergence of cloud computing, remote work, and bringing your own device (BYOD) into enterprise networks. Those trends result in networks not completely contained within an enterprise-owned boundary, significantly complicating network security needs.

This article briefly reviews the purpose and structure of ZTAs, looks at some relevant Federal Information Processing Standards (FIPS) and National Institute of Standards and Technology (NIST) standard 800-53, and closes with an overview of the Zero Trust Maturity Model (ZTMM) from the Cybersecurity and Infrastructure Security Agency (CISA).

In a ZTA, pre-authorized user access is eliminated, and each user must earn trust during each interaction based on context and content. Trust is no longer granted automatically to assets or user accounts based on their network or physical location. User and device authentication and access are established before a session on an enterprise resource.

As described in FIPS 199, ZTA is not really an architecture. It’s an approach and a set of principles for workflow, system design, and operation that result in improved cybersecurity. The guiding principles for a ZTA are never trusting users or devices, always verifying the network, environment, applications, and data, assuming a breach is imminent, and using analytics and automation to monitor and maintain cybersecurity continuously, as shown in Figure 1.

ZTA
Figure 1. ZTA guiding principles are never trusted, always verify, and assume a breach is imminent. (Image: Cybeready)

Additional principles that apply when implementing a ZTA include:

  • Least privilege access where users only get the minimal access needed to perform specific tasks
  • Micro-segmentation of networks to isolate systems and restrict movement of potential threats between systems
  • Continuous monitoring and evaluation of user and device activity to identify anomalous and suspicious activities

FIPS 199 sets standards for assessing systems and data based on confidentiality, integrity, and availability. Should a security breach occur, each of the three categories is rated as having a low, moderate, or high impact. The overall system receives the most severe rating, and the security environment must be implemented accordingly.

FIPS 200 and NIST 800-53

While FIPS 199 outlines the approach and need for using ZTAs, FIPS 200 identifies minimum security requirements based on 17 key security considerations and refers users to NIST 800-53 for implementation details. NIST 800-53 is a comprehensive cybersecurity and compliance framework.

It’s continuously updated to maximize its ability to address changing threat environments. NIST 800-53 uses the three impact categories outlined in FIPS 199 and extends the 17 key security considerations in FIPS 200 to include 20 security and control families.

Zero trust maturity model

The CISA developed the ZTMM to guide the measurement of progress when organizations transition from a traditional cybersecurity model to a ZTA. The ZTMM recognizes that organizations don’t instantly switch to using a ZTA. It can be used to understand the current level of ZTA maturity and plan the steps needed to move to a higher level.

The existence of deeply rooted legacy systems is usually a primary challenge when moving to a ZTA. When assessing the maturity level, the ZTMM focuses on five key pillars: identity, devices, networks, applications and workloads, and data. It supports a structured approach to prioritizing changes and transitioning to a full ZTA.

Within each of the five pillars, the ZTMM describes increasing maturity levels as traditional, initial, advanced, and optimal. Three key maturity levels include those shown in Figure 2.

ZTA
Figure 2. Three key ZTMM maturity levels. (Image: InterSec)
  1. Traditional means that the legacy system operation has been partitioned into five pillars, but still requires manual intervention for configuration, incident response, and mitigation.
  2. Advanced identifies a network with some cross-pillar coordination, some pre-defined incident responses, some least privilege changes implemented, and the initial deployment of centralized identity control and network visibility.
  3. Optimal is when full automation has been achieved, including assigning attributes to assets and resources, dynamic access policies including least privilege access based on observed triggers and actions, and full alignment with industry standards.

Summary

ZTAs have been developed to address the insecurities inherent in cloud computing, remote work, and BYOD in enterprise networks. Several standards, including FIPS 199, FIPS 200, and NIST 800-53, are important when developing a ZTA. In addition, the ZTMM can provide a roadmap for incrementally transitioning from a traditional network architecture to a ZTA.

References

Four steps to edge-to-cloud Zero Trust with AI-powered single-vendor SASE, Hewlett Packard Enterprise
The Government’s Zero Trust Strategy Explained, Second Front
What is a Zero Trust Architecture, Palo Alto Networks
What Is Zero Trust?, Zscalar
What is Zero Trust Architecture?, SANS Institute
Zero Trust Architecture, Mad Devs
Zero Trust Architecture, National Institute of Standards and Technology
Zero Trust Maturity Model, Cybersecurity and Infrastructure Security Agency
Zero Trust-The Five Pillars of CISA Maturity Model, InterSec

Related EE World content

Security tools foster zero-trust security environments for IoT networks
Security services support ‘Zero Trust’ security model in IoT
Securing devices for the IoT — IEC 62443, SESIP, and PSA
Safety and cyber security for the connected car
Zigbee protocol stack revision includes additional security enhancements

You may also like:


  • How to integrate theft-prevention tracking capabilities in IoT devices

  • What can be done to prepare for post quantum cryptography?

  • What’s new in the NIST CSF 2.0 framework?

  • What are the elements of secure boot processes?

  • How are AI and ML used for advanced threat detection?

Filed Under: Applications, Embedded, FAQ, Featured, Security Tagged With: FAQ

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Featured Contributions

Navigating the EU Cyber Resilience Act: a manufacturer’s perspective

The intelligent Edge: powering next-gen Edge AI applications

Engineering harmony: solving the multiprotocol puzzle in IoT device design

What’s slowing down Edge AI? It’s not compute, it’s data movement

Five challenges for developing next-generation ADAS and autonomous vehicles

More Featured Contributions

EE TECH TOOLBOX

“ee
Tech Toolbox: Power Efficiency
Discover proven strategies for power conversion, wide bandgap devices, and motor control — balancing performance, cost, and sustainability across industrial, automotive, and IoT systems.

EE Learning Center

EE Learning Center

EE ENGINEERING TRAINING DAYS

engineering
“bills
“microcontroller
EXPAND YOUR KNOWLEDGE AND STAY CONNECTED
Get the latest info on technologies, tools and strategies for EE professionals.

Footer

Microcontroller Tips

EE World Online Network

  • 5G Technology World
  • EE World Online
  • Engineers Garage
  • Analog IC Tips
  • Battery Power Tips
  • Connector Tips
  • EDA Board Forums
  • Electro Tech Online Forums
  • EV Engineering
  • Power Electronic Tips
  • Sensor Tips
  • Test and Measurement Tips

Microcontroller Tips

  • Subscribe to our newsletter
  • Advertise with us
  • Contact us
  • About us

Copyright © 2025 · WTWH Media LLC and its licensors. All rights reserved.
The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of WTWH Media.

Privacy Policy