Cybersecurity Implementation: NIST NCCoE Zero Trust Architecture and Microsoft Zero Trust Capability Mapping
Rashad Bakirov
Senior Cloud Consultant | Microsoft 365 Security | Compliance | Data Governance | Cybersecurity | ISO-27001 Security Officer Role
Today, I will explore the NIST NCCoE Zero Trust Architecture and how Microsoft Security Products fit into this framework.
The National Cybersecurity Center of Excellence (NCCoE), part of the National Institute of Standards and Technology (NIST), is a collaborative hub that brings together government, academia, and industry to address the most pressing cybersecurity challenges. One of its its key projects is the development of the Zero Trust Architecture (ZTA), a cybersecurity framework that emphasizes continuous verification, strict access controls, and advanced threat detection to protect systems, users, and data. ZTA removes implicit trust from any element inside or outside the organization, enforcing “least privilege” access principles.???.
The NIST Zero Trust Architecture includes six core components for a cybersecurity framework:
Here is the current High Leve Zero Trust Architecture by NIST. Screen taken from the NCCoE website; you can find more information ?? https://www.nccoe.nist.gov/zerotrust
According to the Microsoft Cybersecurity Reference Architecture (MCRA), Microsoft has collaborated with the NCCoE to implement a Zero Trust Capability Map using the NIST ZTA framework. Microsoft uses its Security Portfolio products to map with NIST for protecting endpoints, managing identity and access, enforcing policies, protecting resources, and providing ongoing security analytics
Let’s go step by step through each NIST area and sub-area to see which Microsoft services have capabilities for each area.
?? All screenshots in this article are taken from the Microsoft Cybersecurity Reference Architecture (MCRA), which you can freely find at this URL??: Microsoft Cybersecurity Reference Architectures (MCRA) | Microsoft Learn . Microsoft Cybersecurity Reference Architecture (MCRA
1. Endpoint Security ???:
This layer focuses on safeguarding users and their devices (including mobile devices and those with Software-Defined Perimeter (SDP) clients). It ensures that all devices accessing the network are verified, monitored, and managed according to organizational security policies.
To implement this recommendation with Microsoft, you can use:
2. Identity, Credential, and Access Management (ICAM)??:
ICAM is responsible for managing identity and credentials (both for users and devices). It includes authentication (using mechanisms like Single Sign-On (SSO) and Multi-Factor Authentication (MFA)) and authorization to ensure that only trusted identities can access network resources. It also covers federation for cross-system identity integration and governance to enforce policies.
To implement ICAM, Microsoft services include:
3. Policy Enforcement / Admin (PE/PA)??:
The Policy Enforcement / Admin component defines how access requests are evaluated and how policies are enforced. This layer relies on Policy Enforcement Points (PEP) to control access, granting or denying access based on predefined security policies.
To map Microsoft services to this layer:
领英推荐
4. Protected Resources???:
This element focuses on securing cloud applications, on-premises apps, and workloads (including file shares, databases, and storage). The ZTA ensures that only authorized users and devices can access protected resources, regardless of where they are hosted.
To implement protection for cloud and on-premises resources, Microsoft offers:
5. Data Security???:
Data Security is essential for protecting sensitive information, ensuring it remains confidential, integral, and available only to authorized entities. This layer involves measures like Data Loss Prevention (DLP), encryption, and other information protection technologies.
Microsoft provides robust tools to implement data security, such as:
6. Security Analytics ??:
At the core of the Zero Trust Architecture is the need for continuous Security Analytics. This layer collects security telemetry from various sources across the environment to identify threats, detect anomalies, and provide real-time insights. It is critical for enhancing situational awareness and responding to incidents in a timely manner.
To implement continuous security analytics, Microsoft offers:
Conclusion ??
Implementing Zero Trust Architecture using NIST’s framework through Microsoft’s portfolio is crucial for modern cybersecurity. By leveraging Microsoft Entra, Intune, Defender, Purview, and Sentinel, you can create a comprehensive, proactive security posture that continuously verifies identities, monitors threats, and enforces policies across your organization’s resources and devices ??.