Close this search box.

We are creating some awesome events for you. Kindly bear with us.

Zero Trust Framework: NSA’s Blueprint for Enhanced Security

Getting your Trinity Audio player ready...

The National Security Agency (NSA) is actively involved in assisting Department of Defense (DoD) customers in implementing Zero Trust systems. The agency is committed to developing additional guidance to integrate Zero Trust principles into enterprise networks, demonstrating its dedication to enhancing cybersecurity across government and private sectors. This commitment aims to strengthen the security posture of critical infrastructure and key resources, ensuring robust protection against cyber threats.

Zero Trust is a security framework that requires all users, whether inside or outside the organisation’s network, to be authenticated, authorised, and continuously validated for security configuration and posture before being granted or maintaining access to applications and data. This approach assumes that there is no traditional network edge, meaning that networks can be local, in the cloud, or a hybrid combination with resources located anywhere, and workers can be in any location.

The NSA’s efforts are part of a broader strategy to enhance cybersecurity posture across various sectors. By providing detailed guidance and best practices, the NSA aims to assist organisations of all sizes in implementing effective Zero Trust architectures.

This latest initiative builds on the NSA’s previously released Cybersecurity Information Sheets (CSIs) on Zero Trust, including guidance on embracing a Zero Trust security model and advancing Zero Trust maturity throughout different pillars such as user, device, data, network and environment. These documents offer specific recommendations for implementing Zero Trust principles in various aspects of an organisation’s IT environment, forming a comprehensive roadmap for achieving a robust cybersecurity posture.

The challenge of securing applications and workloads in a Zero Trust environment is not unique to the NSA. Heather J., technical director in S&CI’s Office of Physical Security, has been collaborating with the Office of the Director of National Intelligence (ODNI) to address concerns across the Intelligence Community. “I wrote the current NSA hearing aid Bluetooth mitigation policy and am working with ODNI to write the medical device policy for the entire Intelligence Community,” Heather said.

Both Heather and Stephanie P., IoT Security team lead for LACR’s Trust Mechanisms office, are proud of the progress made. “It’s fantastic that this work enables employees with hearing loss to take advantage of the latest advancements in hearing aid technology while at work,” Stephanie said.

“Balancing the needs of our workforce with the security of our facilities is getting harder as technologies advance,” Heather agreed. “We’re excited to have a way forward for this hearing aid feature and continue to explore novel ways to mitigate new and emerging technical threats to maximise our ability to permit the latest technology without compromising our missions.”

The release of the CSI on “Advancing Zero Trust Maturity Throughout the Application and Workload Pillar” signifies a significant advancement in the NSA’s efforts to promote Zero Trust principles. By providing detailed guidance and best practices, the NSA aims to help organisations secure their applications and workloads against unauthorised access and potential cyber threats.

As digital technology evolves, the NSA’s commitment to advancing cybersecurity measures ensures that organisations can adopt the latest innovations while maintaining a robust security posture. The integration of Zero Trust principles into modern network environments is crucial for safeguarding sensitive data, applications, assets, and services in an increasingly complex and interconnected world.

Looking ahead, the NSA plans to continue its collaborative efforts with government and private sector partners to enhance cybersecurity measures further and address emerging threats. The agency remains dedicated to providing comprehensive guidance and support to help organisations navigate the evolving cybersecurity landscape and protect their critical assets.


Qlik’s vision is a data-literate world, where everyone can use data and analytics to improve decision-making and solve their most challenging problems. A private company, Qlik offers real-time data integration and analytics solutions, powered by Qlik Cloud, to close the gaps between data, insights and action. By transforming data into Active Intelligence, businesses can drive better decisions, improve revenue and profitability, and optimize customer relationships. Qlik serves more than 38,000 active customers in over 100 countries.


As a Titanium Black Partner of Dell Technologies, CTC Global Singapore boasts unparalleled access to resources.

Established in 1972, we bring 52 years of experience to the table, solidifying our position as a leading IT solutions provider in Singapore. With over 300 qualified IT professionals, we are dedicated to delivering integrated solutions that empower your organization in key areas such as Automation & AI, Cyber Security, App Modernization & Data Analytics, Enterprise Cloud Infrastructure, Workplace Modernization and Professional Services.

Renowned for our consulting expertise and delivering expert IT solutions, CTC Global Singapore has become the preferred IT outsourcing partner for businesses across Singapore.


Planview has one mission: to build the future of connected work. Our solutions enable organizations to connect the business from ideas to impact, empowering companies to accelerate the achievement of what matters most. Planview’s full spectrum of Portfolio Management and Work Management solutions creates an organizational focus on the strategic outcomes that matter and empowers teams to deliver their best work, no matter how they work. The comprehensive Planview platform and enterprise success model enables customers to deliver innovative, competitive products, services, and customer experiences. Headquartered in Austin, Texas, with locations around the world, Planview has more than 1,300 employees supporting 4,500 customers and 2.6 million users worldwide. For more information, visit


SIRIM is a premier industrial research and technology organisation in Malaysia, wholly-owned by the Minister​ of Finance Incorporated. With over forty years of experience and expertise, SIRIM is mandated as the machinery for research and technology development, and the national champion of quality. SIRIM has always played a major role in the development of the country’s private sector. By tapping into our expertise and knowledge base, we focus on developing new technologies and improvements in the manufacturing, technology and services sectors. We nurture Small Medium Enterprises (SME) growth with solutions for technology penetration and upgrading, making it an ideal technology partner for SMEs.


HashiCorp provides infrastructure automation software for multi-cloud environments, enabling enterprises to unlock a common cloud operating model to provision, secure, connect, and run any application on any infrastructure. HashiCorp tools allow organizations to deliver applications faster by helping enterprises transition from manual processes and ITIL practices to self-service automation and DevOps practices. 


IBM is a leading global hybrid cloud and AI, and business services provider. We help clients in more than 175 countries capitalize on insights from their data, streamline business processes, reduce costs and gain the competitive edge in their industries. Nearly 3,000 government and corporate entities in critical infrastructure areas such as financial services, telecommunications and healthcare rely on IBM’s hybrid cloud platform and Red Hat OpenShift to affect their digital transformations quickly, efficiently and securely. IBM’s breakthrough innovations in AI, quantum computing, industry-specific cloud solutions and business services deliver open and flexible options to our clients. All of this is backed by IBM’s legendary commitment to trust, transparency, responsibility, inclusivity and service.