Active PAR

IEEE P3409

IEEE Draft Standard for a Zero Trust Security

This draft standard for Zero Trust Security provides a comprehensive framework for implementing Zero Trust Architecture (ZTA), a cybersecurity paradigm that emphasizes the principles of "never trust, always verify," assume breach, and apply least privilege. The standard outlines requirements for transitioning from traditional perimeter-based security models to dynamic, granular security controls that protect organizational assets. The framework is structured around five core domains--Identity, Devices, Networks, Applications & Workloads, and Data--and three cross-cutting domains--Governance, Visibility & Analytics, and Automation & Orchestration. It offers guidance on aligning security policies, implementing continuous monitoring, automating security actions, and safeguarding sensitive data. Designed for developers, architects, and governance stakeholders, this standard aims to mitigate risks, enhance compliance, and adapt to the evolving threat landscape. It emphasizes incremental implementation, organizational change management, and leadership oversight to ensure the successful adoption of Zero Trust principles.

Standard Committee
C/CPSC - Cybersecurity and Privacy Standards Committee
Status
Active PAR
PAR Approval
2023-09-21

Working Group Details

Society
IEEE Computer Society
Standard Committee
C/CPSC - Cybersecurity and Privacy Standards Committee
Working Group
ZTSWG - Zero Trust Security
IEEE Program Manager
Christian Orlando
Contact Christian Orlando
Working Group Chair
Ron Martin

Other Activities From This Working Group

Current projects that have been authorized by the IEEE SA Standards Board to develop a standard.


P2887
Recommended Practice for Zero Trust Security

This recommended practice provides security guidance for Zero Trust Security (ZTS) architectures and implementations.

Learn More About P2887

Standards approved by the IEEE SA Standards Board that are within the 10-year lifecycle.


No Active Standards

These standards have been replaced with a revised version of the standard, or by a compilation of the original active standard and all its existing amendments, corrigenda, and errata.


No Superseded Standards

These standards have been removed from active status through a ballot where the standard is made inactive as a consensus decision of a balloting group.


No Inactive-Withdrawn Standards

These standards are removed from active status through an administrative process for standards that have not undergone a revision process within 10 years.


No Inactive-Reserved Standards
Subscribe to our Newsletter

Sign up for our monthly newsletter to learn about new developments, including resources, insights and more.