Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Topics
  3. Cybersecurity Best Practices
  4. Zero Trust
Share:
Capitol building pillars alight with bright yellow light and computer code in the background

Zero Trust

Zero trust architecture dynamically secures users, devices, and resources, moving beyond static perimeter defenses.

 

IT environments require robust defenses to reduce risk to the cyber and physical infrastructure Americans rely on every day. Driving zero trust (ZT) progress is an important part of CISA's mission of operational collaboration and information sharing.

Adopting ZT principles addresses many of the challenges of the dynamic threat landscape. Specifically, ZT improves visibility, enabling organizations to detect and understand threats more effectively. ZT also facilitates orchestration and automation, allowing for rapid and coordinated threat response.


What Zero Trust Means for Cybersecurity

ZT principles assume the entire network is compromised. That point of view provides a collection of concepts and ideas designed to minimize uncertainty by enforcing precise, least privilege per-request access decisions within information systems and services. The goal is to prevent unauthorized access to data and services and make access control enforcement as granular as possible. ZT presents a shift from a location-centric to a data-centric adaptive approach for fine-grained security controls between users, systems, data, and assets that change over time.


Reads Zero Trust Maturity Model overlaid on capital building pillars

CISA's Zero Trust Maturity Model

CISA’s Zero Trust Maturity Model is one of many roadmaps that agencies can reference as they transition towards a ZT architecture.

Zero Trust Maturity Model

Building Zero Trust Capacity

Since the release of CISA's Zero Trust Maturity Model version 1.0 in September 2021, the agency has been working to accelerate adoption of ZT across the federal enterprise. CISA collaborates with government, commercial, and private sector partners—including global security leaders—to understand key ZT implementation roadblocks and to develop strategies and solutions to address these challenges.

Featured Implementation Guidance

CDA Icon showing a list with a shield and checkmark overlaying it

Encrypted DNS Implementation Guidance

This guidance provides ZT implementation steps for federal agencies to meet federal requirements related to encryption of Domain Name System (DNS) traffic to enhance the cybersecurity posture of their IT networks.

Cloud Security Technical Reference Architecture

This guidance offers considerations for shared services, cloud migration, and cloud security posture management.

Federal Zero Trust Data Security Guide

This guide and its companion piece—available from the Chief Information Officers Council—provide agencies with critical direction on defining, identifying, and securing data assets.

Phishing-resistant Multifactor Authentication Success Story

This report details how USDA successfully implemented phishing-resistant authentication in situations where, in the past, only authentication methods vulnerable to phishing were feasible.

Foundational Zero Trust Resources

NIST SP 800-207 Zero Trust Architecture

This guidance contains an abstract definition of zero trust architecture (ZTA) and gives general deployment models and use cases where zero trust could improve an enterprise’s overall information technology security posture.

Department of Defense Zero Trust Strategy

This Department of Defense ZT strategy provides the necessary guidance for advancing ZT concept development to secure the DoD’s ecosystem against evolving cyber threats.

NSA Guidance: Embracing a Zero Trust Security Model

This guidance recommends leveraging ZT principles to enable system administrators to control how users, processes, and devices engage with data.


 

Contact Us

Please share your thoughts by emailing us.

Email ZeroTrust@mail.cisa.dhs.gov

Zero Trust Reporting

By building a foundation of IT professionals who understand and embrace ZT principles, you are greatly improving your chance of success 

– Federal ZT partner

Featured Content

Encrypted DNS Implementation Guidance

Federal Zero Trust Data Security Guide

Trainings on Zero Trust

Basics of Zero Trust for Federal Agencies

CISA's Zero Trust Maturity Model: An Introduction

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback