We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site....
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyse the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with customised advertisements based on the pages you visited previously and to analyse the effectiveness of the ad campaigns.
Other uncategorised cookies are those that are being analysed and have not been classified into a category as yet.
Understanding Zero Trust Architecture Per NIST SP 800-207
Purpose Built for Zero Trust to Protect Organizations from Breaches and Data Loss
Applications, data and services have moved from the datacenter to the cloud, making them easily accessible by attackers. Users have left the office and are working from anywhere. Legacy security and visibility approaches rely on resources and users to be located in the office to provide protection which is no longer possible.
The iboss Zero Trust SASE is focused on protecting sensitive resources by making them completely inaccessible and invisible to attackers while strictly granting access to trusted and approved users from wherever they work.

Designed To Manage Risk Centered Around Effectiveness & Efficiencies
Greatly reducing cyber risk resulting in breaches and data loss is easily made possible using the iboss Zero Trust SASE because it tackles the problem from the various angles that make organizations vulnerable to attacks.
The platform provides the tools to follow processes outlined in the NIST Risk Management Framework which starts by understanding and classifying what resources exist and need to be protected.
"This definition focuses on the crux of the issue, which is the goal to prevent unauthorized access to data and services coupled with making the access control enforcement as granular as possible. That is, authorized and approved subjects … can access the data to the exclusion of all other subjects (i.e., attackers)."– Page 4, NIST SP 800-207

Core concepts of NIST 800-207 Zero Trust Architecture
Zero Trust is about resource access, not network access. Goal is to reduce risk of breaches and data loss by isolating resources with Policy Enforcement Points (PEP).
For each and every transaction, the PEP approves or denies the connection and logs the transaction. Policies based on "default deny" construct.
Provides key security and compliance controls: Access Control, Visibility via Logging, and Security (DLP, malware defense, compliance) for every transaction.
Each request needs to go through both authentication and authorization
i.e. Check the traveler's ID before getting through the checkpoint
i.e. Allow the traveler to pass the security checkpoint and board the plane (resource) only after security screening is completed
According to NIST, a session is as granular as a single transaction between a user and a resource
"The unit of "session" can be nebulous and differ depending on tools, architecture, etc. The basic definition in a zero trust context is a connection to one resource utilizing one network identity and one privilege for that identity (e.g. read, write, delete, etc.) or even a single operation (similar to an API call)."– Page 2, NIST – Planning for a Zero Trust Architecture
Getting the Tenets right gives a solid foundation for Zero Trust to build on into the future
Resources Cannot Be Accessed Without Going Through The Policy Enforcement Point And Gaining Authorization


This is typically the user. The term "subject" is used because this might be a non-human entity (service, AWS Lambda function, etc.)
This is typically a laptop, desktop or server. This can also be IoT or OT devices that need to be catalogued and managed.
This is an application, data or service that is being protected. Start with enterprise-owned resources that need protection.