PR.IR-01.262
Has your organization implemented a zero trust architecture that restricts network access to each resource based on the principle of least privilege?
Explanation
Zero trust architecture operates on the principle that no user or system should be inherently trusted, requiring continuous verification before granting access to resources. This approach involves microsegmentation of networks, strong identity verification, and just-in-time, just-enough access controls to minimize the attack surface. Implementing zero trust helps prevent lateral movement by attackers if a system is compromised, as each resource has its own access controls regardless of network location. Evidence of implementation could include network architecture diagrams showing segmentation, access control policies documenting least privilege implementations, identity and access management configurations, or reports from zero trust assessment tools that demonstrate how resource access is restricted to only necessary users and systems.
Implementation Example
Implement zero trust architectures to restrict network access to each resource to the minimum necessary
ID: PR.IR-01.262
Context
- Function
- PR: PROTECT
- Category
- PR.IR: Technology Infrastructure Resilience
- Sub-Category
- Networks and environments are protected from unauthorized logical access and usage

