This paper serves as ATARC’s State and Local Cyber Grants Working Group’s document building upon their “Baseline Cybersecurity Best Practices: An Overview for Success in Applying for the State and Local Cybersecurity Program.”
They now venture into the strategic shift toward establishing a Zero Trust Architecture (ZTA). Their model is rooted in the comprehensive framework provided by CISA’s Zero Trust Maturity Model 2.0. This initiative aims to dissociate access controls from network architecture, substituting the conventional security perimeter with micro-perimeters, thereby enhancing granular control of network resources.
Format: |
|
Topics: | |
Website: | Visit Publisher Website |
Publisher: | ATARC |
Published: | June 28, 2023 |
Copyright: | © 2023 ATARC |