GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Intermediate Cybersecurity Best Practices: Advancing Cybersecurity Posture Through Zero Trust Architecture

This paper serves as ATARC’s State and Local Cyber Grants Working Group’s document building upon their “Baseline Cybersecurity Best Practices: An Overview for Success in Applying for the State and Local Cybersecurity Program.”

They now venture into the strategic shift toward establishing a Zero Trust Architecture (ZTA). Their model is rooted in the comprehensive framework provided by CISA’s Zero Trust Maturity Model 2.0. This initiative aims to dissociate access controls from network architecture, substituting the conventional security perimeter with micro-perimeters, thereby enhancing granular control of network resources.

  • Author(s):
  • ATARC
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Intermediate Cybersecurity Best Practices: Advancing Cybersecurity Posture Through Zero Trust Architecture
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:ATARC
Published:June 28, 2023
License:Copyrighted
Copyright:© 2023 ATARC

Featured Content

Contact Publisher

Claim Content