This guide has been prepared so that IT and security administrators can understand how BeyondTrust Privileged Access Management (PAM) solutions map into guidelines set forth in the NIST Special Publication (SP) 800-2017 on Zero Trust Architecture. NIST defines these core concepts as follows:
- Zero Trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network- based perimeters to focus on users, assets, and resources.
- Zero Trust architecture (ZTA) uses zero trust principles to plan industrial and enterprise infrastructure and workflows.
Zero trust assumes there is no implicit trust granted to assets or user accounts based solely on their physical or network location (i.e., local area networks versus the internet) or based on asset ownership (enterprise or personally owned). Authentication and authorization (both subject and device) are discrete functions performed before a session to an enterprise resource is established.